lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CY4PR18MB11424C08792C4C8B653AA3CCDAB60@CY4PR18MB1142.namprd18.prod.outlook.com>
Date: Fri, 4 Aug 2017 04:23:03 +0000
From: kyaw thiha <kyawthiha89@...e.com>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: [FD] Format Factory DLL Hijacking Vulnerability

Format Factory DLL Hijacking Vulnerability

Product
---------------
Format Factory is a comprehensive audio, video and photo converter and ripper that will satisfy your every need, all by having simple interface that can be used by everyone. Download Format Factory Offline Installer Setup for Windows.


Vulerability Description
-----------------
Format factory is vulnerable to Insecure DLL Hijacking Vulnerability. Similar terms that describe this vulnerability have been come up with Remote Binary Planting, and Insecure DLL Loading/Injection/Hijacking/Preloading.
DLL Hijacking is an attack that exploits the way some Windows applications search and load Dynamic Link Libraries.


Affected Library List
---------------------
- msimg32.dll
- WindowsCodecs.dll
- dwmapi.dll


Version Affect
---------
4.1.0
Tested Platform: Windows 7 x86


POC
--------------
http://www.kth.ninja/2017/08/format-factory-dll-hijacking.html


Impact
-----------
This occurs when an application fails to resolve a DLL because the DLL does not exist in the specified path or search directories. If this happens, a malicious Dll with the same name can be placed in the specified path directory leading to remote code execution.


Remediation
-----------------
Require set paths for DLLs in applications
http://blogs.technet.com/b/srd/archive/2010/08/23/more-information-about-dll-preloading-remote-attack-vector.aspx


Vendor
---------
Format Factory
http://www.pcfreetime.com/formatfactory/

Found By
------------------
Kyaw Thiha



Reference
---------------
https://support.microsoft.com/en-us/help/2389418/secure-loading-of-libraries-to-prevent-dll-preloading-attacks
https://cwe.mitre.org/data/definitions/427.html


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ