Vulnerabilities / Threats
8/24/2010
12:26 PM
50%
50%

Microsoft Confirms Windows DLL Hijacking Vulnerabilities

Proof-of-concept code for the remote execution attack hits the wild; numerous applications at risk.




Slideshow: Microsoft's Windows Phone 7 Revealed
(click for larger image and for full photo gallery)
Numerous applications for the Microsoft Windows operating system are vulnerable to a remote execution attack, Microsoft confirmed Monday.

The vulnerability stems from the manner in which some Windows applications process DLL files. "DLL hijacking attacks are targeted at Windows applications -- third party and Microsoft -- that have not followed recommended security practices and can be tricked to load DLLs from locations that are owned by the attacker," said Wolfgang Kandek, chief technology officer at Qualys, in a blog post. But if attackers disguise malicious code as a DLL file, which an application then executes, then the code can provide the attacker with control of the machine.

For this bug at least, blame application programmers. "This issue is caused by specific insecure programming practices that allow so-called 'binary planting' or 'DLL preloading attacks,'" Microsoft confirmed yesterday in a security advisory.

The company reiterated its existing advice for using safe techniques for loading external libraries. It also noted that for a DLL hijacking attack to be successful, a user would have to visit a remote file system or WebDAV share, then open a document from this location. To that end, Microsoft also released a hotfix for controlling the DLL search path algorithm.

To mitigate the vulnerability, "we recommend installing the hotfix," said Kundek, as well as "setting the registry to not allow loading of binaries via network shares and WebDAV (setting 2) as soon as possible."

Microsoft is still investigating its own products to see which are affected by the DLL vulnerability. The DLL vulnerability was first documented earlier this year in a paper titled Automatic Detection of Vulnerable Dynamic Component Loading by researchers Taeho Kwon and Zhendong Su from the University of California at Davis.

But the vulnerability gained attention last week due to a security advisory from Slovenian security firm Acros, which labeled it as a binary planting flaw in iTunes.

Many more applications appear to be infected. "While working on the Windows Shortcut exploit, I stumbled on this class of bugs and identified a couple dozen applications that seemed to be affected by this problem," said HD Moore, chief security officer at Rapid7 and chief architect of the Metasploit Framework, an open source penetration testing platform, on the Rapid7 blog.

He's added a DLL exploit capability to Metasploit, meaning that anyone can now study the attack and see how it works, as well as unearth more vulnerable applications.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.