Risk

11/24/2010
12:18 PM
50%
50%

Most Microsoft DLL Hijacking Vulnerabilities Remain Unpatched

Three months after they were first disclosed, only 15% of known bugs have been patched, reports ACROS Security.

Strategic Security Survey: Global Threat, Local Pain
Strategic Security Survey: Global Threat, Local Pain
(click image for larger view and for full slideshow)

Only 15% of publicly known DLL hijacking vulnerabilities have been fixed, according to Slovenian security firm ACROS Security.

Nearly 100 days ago, the vulnerabilities -- also known as binary planting, DLL preloading, and insecure library loading -- as well as related EXE loading bugs were first disclosed. Attackers can exploit the vulnerabilities, which stem from the insecure manner in which Microsoft Windows performs file location searches, to run arbitrary code.

But to date, according to vulnerability information service Secunia, only 23 out of 151 DLL planting bugs have been fixed. On the upside, however, seven of the eight known EXE loading vulnerabilities have been patched.

"Interestingly, after some web browser vendors' initial quick response (Firefox, Opera, Safari), most of the fixes were done by smaller vendors, perhaps predominantly in open source software," said Mitja Kolsek, the CEO and CTO of ACROS, in a blog post.

But what accounts for the slow patching response by larger vendors to known vulnerabilities, given that they've had more than three months to fix the relevant flaws in their software? "In general, large vendors seem to be very slow in patching -- which is often rationalized by extensive testing they need to perform, but may also be due to their business models not providing sufficient rewards for security fixing," said Kolsek.

Unfortunately, beyond Secunia's list of vulnerable applications, which is based on security bulletins issued by vendors, there's also "shadow list" of vendors and developers that have yet to acknowledge DLL vulnerabilities. ACROS said it's created a dedicated Binary Planting website for tracking these unknown or orphaned vulnerabilities.

From December 2008 to July 2010, ACROS counted at least 66 DLL planting bugs, only 6% of which have been fixed, and 28 EXE planting bugs, none of which have been fixed. Kolsek said that "it is unknown whether the affected applications' authors are aware [of] these vulnerabilities or not."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11505
PUBLISHED: 2018-05-26
The Werewolf Online application 0.8.8 for Android allows attackers to discover the Firebase token by reading logcat output.
CVE-2018-6409
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. The module in charge of serving stored files gets the path from the database. Modifying the name of the file to serve on the corresponding ap_form table leads to a path traversal vulnerability via the download.php q parameter.
CVE-2018-6410
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. There is a download.php SQL injection via the q parameter.
CVE-2018-6411
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. When the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. If the filter is set to a whitelist, the dangerous extensions can be bypassed through ap_form_elements SQL Injection.
CVE-2018-11500
PUBLISHED: 2018-05-26
An issue was discovered in PublicCMS V4.0.20180210. There is a CSRF vulnerability in "admin/sysUser/save.do?callbackType=closeCurrent&navTabId=sysUser/list" that can add an admin account.