[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAFQNZ6oth-_LFErmcrDNTu5RvSq=cn8mFH9JvFpu9xsgY3vhsg@mail.gmail.com>
Date: Wed, 23 Dec 2015 17:46:28 +0100
From: "NaxoneZ ." <naxonez@...il.com>
To: Shawn McMahon <syberghost@...il.com>
Cc: fulldisclosure@...lists.org
Subject: Re: [FD] Executable installers are vulnerable^WEVIL (case 15):
F-SecureOnlineScanner.exe allows arbitrary (remote) code execution and
escalation of privilege
I think like Shawn, this is a SO problem:
https://msdn.microsoft.com/es-es/library/windows/desktop/ff919712(v=vs.85).aspx
Anyway the developers can mitigate this issue following the guidelines
described in article.
Regards.
2015-12-23 16:32 GMT+01:00 Shawn McMahon <syberghost@...il.com>:
> On Wed, Dec 23, 2015 at 7:13 AM, Stefan Kanthak <stefan.kanthak@...go.de>
> wrote:
>
> > Hi @ll,
> >
> > F-Secure's online virus scanner F-SecureOnlineScanner.exe, available
> > via <https://www.f-secure.com/en/web/home_global/online-scanner>,
> > loads and executes several rogue/bogus DLLs (UXTheme.dll, HNetCfg.dll,
> > RASAdHlp.dll, SetupAPI.dll, ClbCatQ.dll, XPSP2Res.dll, CryptNet.dll,
> > OLEAcc.dll etc.) eventually found in the directory it is started from
> > (the "application directory").
> >
>
> How long are you going to keep whacking these moles before you admit that
> this is an OS problem, not an apps problem, and that Microsoft needs to fix
> it?
>
> Because the moles breed a lot faster than you can whack.
>
> _______________________________________________
> Sent through the Full Disclosure mailing list
> https://nmap.org/mailman/listinfo/fulldisclosure
> Web Archives & RSS: http://seclists.org/fulldisclosure/
>
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists