Vulnerabilities / Threats
8/23/2010
05:40 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Fixed iTunes Flaw Linked To Broad Set Of Vulnerabilities

A Windows DLL hijacking vulnerability is believed to affect dozens of applications, including at least four from Microsoft.

A vulnerability in the Windows version of Apple's iTunes 9.0.3.15 software that Apple addressed earlier this year has been linked a broad DLL loading problem believed to affect dozens of applications from different vendors, including at least four Microsoft programs.

Rapid7 chief security officer HD Moore, who recently wrote two detailed blog posts on the subject, said in a phone interview that he expects Microsoft to release a security advisory or further information at some point on Monday.

Moore said he had stumbled across this class of DLL hijacking vulnerabilities while working on a Windows Shortcut exploit. He had planned to publish an advisory and to begin notifying vendors last week when Acros, a Slovenian security firm, published details about exploiting an old version of iTunes using a file on a remote network share.

Apple fixed this flaw in its iTunes 9.1 security update in March. But dozens of other Windows software vendors still need to deal with this issue.

According to Moore, maybe 40 or 50 applications appear to be vulnerable from a testing standpoint, though fewer will be vulnerable in practice. He said maybe 15 or 20 apps on a given desktop are likely to be affected.

"This vulnerability is triggered when a vulnerable file type is opened from within a directory controlled by the attacker," Moore explained in a blog post. "This directory can be a USB drive, an extracted archive, or a remote network share. In most cases, the user will have to browse to the directory and then open the target file type for this exploit to work."

The DLL flaw goes back about ten years, said Moore, and while past fixes have mitigated some of the risk, the issue has yet to be effectively dealt with.

A paper published earlier this year and presented in July at the International Symposium on Software Testing and Analysis 2010 describes this class of DLL loading vulnerabilities. The report's co-authors say that they used an automated tool to identity 1,700 unsafe DLL loadings in 28 widely used software applications and that Microsoft has been made aware of their findings.

Moore has updated his Metasploit Framework with a generic exploit module and audit kit to assist in the identification of vulnerable applications.

As of 3pm PST on Monday, Microsoft has not provided information about this issue on its security advisory Web site.

Update: Around 4pm PST, Microsoft published a security advisory covering DLL attacks.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3580
Published: 2014-12-18
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.

CVE-2014-4801
Published: 2014-12-18
Cross-site scripting (XSS) vulnerability in IBM Rational Quality Manager 2.x through 2.0.1.1, 3.x before 3.0.1.6 iFix 4, 4.x before 4.0.7 iFix 2, and 5.x before 5.0.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-6076
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allow remote attackers to conduct clickjacking attacks via a crafted web site.

CVE-2014-6077
Published: 2014-12-18
Cross-site request forgery (CSRF) vulnerability in IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.

CVE-2014-6078
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 do not have a lockout period after invalid login attempts, which makes it easier for remote attackers to obtain admin access via a brute-force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.