lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 4 Aug 2017 04:23:03 +0000
From: kyaw thiha <>
To: "" <>
Subject: [FD] Format Factory DLL Hijacking Vulnerability

Format Factory DLL Hijacking Vulnerability

Format Factory is a comprehensive audio, video and photo converter and ripper that will satisfy your every need, all by having simple interface that can be used by everyone. Download Format Factory Offline Installer Setup for Windows.

Vulerability Description
Format factory is vulnerable to Insecure DLL Hijacking Vulnerability. Similar terms that describe this vulnerability have been come up with Remote Binary Planting, and Insecure DLL Loading/Injection/Hijacking/Preloading.
DLL Hijacking is an attack that exploits the way some Windows applications search and load Dynamic Link Libraries.

Affected Library List
- msimg32.dll
- WindowsCodecs.dll
- dwmapi.dll

Version Affect
Tested Platform: Windows 7 x86


This occurs when an application fails to resolve a DLL because the DLL does not exist in the specified path or search directories. If this happens, a malicious Dll with the same name can be placed in the specified path directory leading to remote code execution.

Require set paths for DLLs in applications

Format Factory

Found By
Kyaw Thiha


Sent through the Full Disclosure mailing list
Web Archives & RSS:

Powered by blists - more mailing lists