lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAFQNZ6oth-_LFErmcrDNTu5RvSq=cn8mFH9JvFpu9xsgY3vhsg@mail.gmail.com>
Date: Wed, 23 Dec 2015 17:46:28 +0100
From: "NaxoneZ ." <naxonez@...il.com>
To: Shawn McMahon <syberghost@...il.com>
Cc: fulldisclosure@...lists.org
Subject: Re: [FD] Executable installers are vulnerable^WEVIL (case 15):
 F-SecureOnlineScanner.exe allows arbitrary (remote) code execution and
 escalation of privilege

I think like Shawn, this is a SO problem:

https://msdn.microsoft.com/es-es/library/windows/desktop/ff919712(v=vs.85).aspx

Anyway the developers can mitigate this issue following the guidelines
described in article.

Regards.

2015-12-23 16:32 GMT+01:00 Shawn McMahon <syberghost@...il.com>:

> On Wed, Dec 23, 2015 at 7:13 AM, Stefan Kanthak <stefan.kanthak@...go.de>
> wrote:
>
> > Hi @ll,
> >
> > F-Secure's online virus scanner F-SecureOnlineScanner.exe, available
> > via <https://www.f-secure.com/en/web/home_global/online-scanner>,
> > loads and executes several rogue/bogus DLLs (UXTheme.dll, HNetCfg.dll,
> > RASAdHlp.dll, SetupAPI.dll, ClbCatQ.dll, XPSP2Res.dll, CryptNet.dll,
> > OLEAcc.dll etc.) eventually found in the directory it is started from
> > (the "application directory").
> >
>
> How long are you going to keep whacking these moles before you admit that
> this is an OS problem, not an apps problem, and that Microsoft needs to fix
> it?
>
> Because the moles breed a lot faster than you can whack.
>
> _______________________________________________
> Sent through the Full Disclosure mailing list
> https://nmap.org/mailman/listinfo/fulldisclosure
> Web Archives & RSS: http://seclists.org/fulldisclosure/
>

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ