Vulnerabilities / Threats
8/24/2010
12:26 PM
50%
50%

Microsoft Confirms Windows DLL Hijacking Vulnerabilities

Proof-of-concept code for the remote execution attack hits the wild; numerous applications at risk.




Slideshow: Microsoft's Windows Phone 7 Revealed
(click for larger image and for full photo gallery)
Numerous applications for the Microsoft Windows operating system are vulnerable to a remote execution attack, Microsoft confirmed Monday.

The vulnerability stems from the manner in which some Windows applications process DLL files. "DLL hijacking attacks are targeted at Windows applications -- third party and Microsoft -- that have not followed recommended security practices and can be tricked to load DLLs from locations that are owned by the attacker," said Wolfgang Kandek, chief technology officer at Qualys, in a blog post. But if attackers disguise malicious code as a DLL file, which an application then executes, then the code can provide the attacker with control of the machine.

For this bug at least, blame application programmers. "This issue is caused by specific insecure programming practices that allow so-called 'binary planting' or 'DLL preloading attacks,'" Microsoft confirmed yesterday in a security advisory.

The company reiterated its existing advice for using safe techniques for loading external libraries. It also noted that for a DLL hijacking attack to be successful, a user would have to visit a remote file system or WebDAV share, then open a document from this location. To that end, Microsoft also released a hotfix for controlling the DLL search path algorithm.

To mitigate the vulnerability, "we recommend installing the hotfix," said Kundek, as well as "setting the registry to not allow loading of binaries via network shares and WebDAV (setting 2) as soon as possible."

Microsoft is still investigating its own products to see which are affected by the DLL vulnerability. The DLL vulnerability was first documented earlier this year in a paper titled Automatic Detection of Vulnerable Dynamic Component Loading by researchers Taeho Kwon and Zhendong Su from the University of California at Davis.

But the vulnerability gained attention last week due to a security advisory from Slovenian security firm Acros, which labeled it as a binary planting flaw in iTunes.

Many more applications appear to be infected. "While working on the Windows Shortcut exploit, I stumbled on this class of bugs and identified a couple dozen applications that seemed to be affected by this problem," said HD Moore, chief security officer at Rapid7 and chief architect of the Metasploit Framework, an open source penetration testing platform, on the Rapid7 blog.

He's added a DLL exploit capability to Metasploit, meaning that anyone can now study the attack and see how it works, as well as unearth more vulnerable applications.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.