lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <201607050741.u657ff33005014@sf01web3.securityfocus.com> Date: Tue, 5 Jul 2016 07:41:41 GMT From: wsachin092@...il.com To: bugtraq@...urityfocus.com Subject: Putty (beta 0.67) DLL Hijacking Vulnerability /* Exploit Title: Putty DLL Hijacking Exploit ( UxTheme.dll or ntmarta.dll ) Vendor Homepage:https://the.earth.li/~sgtatham/putty/latest/x86/putty.exe Author: Sachin Wagh (@tiger_tigerboy) Linkedin: https://in.linkedin.com/in/sachin-wagh-95b17555 Affected Version: beta 0.67 Tested on: Windows 7 Ultimate */ Proof-Of-Concept : 1. Create malicious dll file and save it as UxTheme.dll or ntmarta.dll in your "Downloads" directory. 2. Download https://the.earth.li/~sgtatham/putty/latest/x86/putty.exe and save it in your "Downloads" directory. 3. Execute putty.exe from your "Downloads" directory. 4. Malicious dll file gets executed. Credit, *Sachin Wagh*