lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CY4PR18MB11424C08792C4C8B653AA3CCDAB60@CY4PR18MB1142.namprd18.prod.outlook.com> Date: Fri, 4 Aug 2017 04:23:03 +0000 From: kyaw thiha <kyawthiha89@...e.com> To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org> Subject: [FD] Format Factory DLL Hijacking Vulnerability Format Factory DLL Hijacking Vulnerability Product --------------- Format Factory is a comprehensive audio, video and photo converter and ripper that will satisfy your every need, all by having simple interface that can be used by everyone. Download Format Factory Offline Installer Setup for Windows. Vulerability Description ----------------- Format factory is vulnerable to Insecure DLL Hijacking Vulnerability. Similar terms that describe this vulnerability have been come up with Remote Binary Planting, and Insecure DLL Loading/Injection/Hijacking/Preloading. DLL Hijacking is an attack that exploits the way some Windows applications search and load Dynamic Link Libraries. Affected Library List --------------------- - msimg32.dll - WindowsCodecs.dll - dwmapi.dll Version Affect --------- 4.1.0 Tested Platform: Windows 7 x86 POC -------------- http://www.kth.ninja/2017/08/format-factory-dll-hijacking.html Impact ----------- This occurs when an application fails to resolve a DLL because the DLL does not exist in the specified path or search directories. If this happens, a malicious Dll with the same name can be placed in the specified path directory leading to remote code execution. Remediation ----------------- Require set paths for DLLs in applications http://blogs.technet.com/b/srd/archive/2010/08/23/more-information-about-dll-preloading-remote-attack-vector.aspx Vendor --------- Format Factory http://www.pcfreetime.com/formatfactory/ Found By ------------------ Kyaw Thiha Reference --------------- https://support.microsoft.com/en-us/help/2389418/secure-loading-of-libraries-to-prevent-dll-preloading-attacks https://cwe.mitre.org/data/definitions/427.html _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists