[<prev] [next>] [day] [month] [year] [list]
Message-ID: <hRZQ8__Gtfbk2o3zih2T7rjiFwR8DSGkkKEVd9PXW2ZKbDUuBxgBScuKXUPjMyh9puS3NwJBzIv7Eggx55_pMZucieJS-9gYchueWUsgHG4=@protonmail.com>
Date: Sat, 09 Dec 2017 14:36:27 -0500
From: Maelstrom Security via Fulldisclosure <fulldisclosure@...lists.org>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: [FD] Sony PS4 Remote Play - DLL Hijack vulnerability
Application: PS4 Remote Play
Application Version: 2.5.0.9220
Platform: Windows
Vendor: Sony
Notified at: secure@...y.com (3 months ago),no reply, and still no fix...
PS4 Remote Play application is vulnerable to DLL Hijacking Vulnerability. If executable is installed in unprotected directories (where any user can have access)or in portable form (which is often installed outside of program files or %windir%) it is possible to hijack DLL by placing malformed dll in application directory and run malicious actions (arbitrary code execute with the privilige level of executing user) when application loads the dll.
Affected Library List
---------------------
VERSION.dll
CRYPTSP.dll
DWrite.dll
iphlpapi.dll
rasapi32.dll
rtutils.dll
winhttp.dll
secur32.dll
WindowsCodecs.dll
RichEd20.DLL
d3d9.dll
igdumd32.dll
WtsApi32.dll
WINSTA.dll
USERENV.dll
WindowsCodecsExt.dll
urlmon.dll
AUDIOSES.DLL
More info & Remediation:
https://blogs.technet.microsoft.com/srd/2010/08/23/more-information-about-the-dll-preloading-remote-attack-vector/
Thank You,
Maelstrom Security
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists