[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CY4PR18MB11424C08792C4C8B653AA3CCDAB60@CY4PR18MB1142.namprd18.prod.outlook.com>
Date: Fri, 4 Aug 2017 04:23:03 +0000
From: kyaw thiha <kyawthiha89@...e.com>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: [FD] Format Factory DLL Hijacking Vulnerability
Format Factory DLL Hijacking Vulnerability
Product
---------------
Format Factory is a comprehensive audio, video and photo converter and ripper that will satisfy your every need, all by having simple interface that can be used by everyone. Download Format Factory Offline Installer Setup for Windows.
Vulerability Description
-----------------
Format factory is vulnerable to Insecure DLL Hijacking Vulnerability. Similar terms that describe this vulnerability have been come up with Remote Binary Planting, and Insecure DLL Loading/Injection/Hijacking/Preloading.
DLL Hijacking is an attack that exploits the way some Windows applications search and load Dynamic Link Libraries.
Affected Library List
---------------------
- msimg32.dll
- WindowsCodecs.dll
- dwmapi.dll
Version Affect
---------
4.1.0
Tested Platform: Windows 7 x86
POC
--------------
http://www.kth.ninja/2017/08/format-factory-dll-hijacking.html
Impact
-----------
This occurs when an application fails to resolve a DLL because the DLL does not exist in the specified path or search directories. If this happens, a malicious Dll with the same name can be placed in the specified path directory leading to remote code execution.
Remediation
-----------------
Require set paths for DLLs in applications
http://blogs.technet.com/b/srd/archive/2010/08/23/more-information-about-dll-preloading-remote-attack-vector.aspx
Vendor
---------
Format Factory
http://www.pcfreetime.com/formatfactory/
Found By
------------------
Kyaw Thiha
Reference
---------------
https://support.microsoft.com/en-us/help/2389418/secure-loading-of-libraries-to-prevent-dll-preloading-attacks
https://cwe.mitre.org/data/definitions/427.html
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists