Vulnerabilities / Threats
8/24/2010
12:26 PM
Connect Directly
RSS
E-Mail
50%
50%

Microsoft Confirms Windows DLL Hijacking Vulnerabilities

Proof-of-concept code for the remote execution attack hits the wild; numerous applications at risk.




Slideshow: Microsoft's Windows Phone 7 Revealed
(click for larger image and for full photo gallery)
Numerous applications for the Microsoft Windows operating system are vulnerable to a remote execution attack, Microsoft confirmed Monday.

The vulnerability stems from the manner in which some Windows applications process DLL files. "DLL hijacking attacks are targeted at Windows applications -- third party and Microsoft -- that have not followed recommended security practices and can be tricked to load DLLs from locations that are owned by the attacker," said Wolfgang Kandek, chief technology officer at Qualys, in a blog post. But if attackers disguise malicious code as a DLL file, which an application then executes, then the code can provide the attacker with control of the machine.

For this bug at least, blame application programmers. "This issue is caused by specific insecure programming practices that allow so-called 'binary planting' or 'DLL preloading attacks,'" Microsoft confirmed yesterday in a security advisory.

The company reiterated its existing advice for using safe techniques for loading external libraries. It also noted that for a DLL hijacking attack to be successful, a user would have to visit a remote file system or WebDAV share, then open a document from this location. To that end, Microsoft also released a hotfix for controlling the DLL search path algorithm.

To mitigate the vulnerability, "we recommend installing the hotfix," said Kundek, as well as "setting the registry to not allow loading of binaries via network shares and WebDAV (setting 2) as soon as possible."

Microsoft is still investigating its own products to see which are affected by the DLL vulnerability. The DLL vulnerability was first documented earlier this year in a paper titled Automatic Detection of Vulnerable Dynamic Component Loading by researchers Taeho Kwon and Zhendong Su from the University of California at Davis.

But the vulnerability gained attention last week due to a security advisory from Slovenian security firm Acros, which labeled it as a binary planting flaw in iTunes.

Many more applications appear to be infected. "While working on the Windows Shortcut exploit, I stumbled on this class of bugs and identified a couple dozen applications that seemed to be affected by this problem," said HD Moore, chief security officer at Rapid7 and chief architect of the Metasploit Framework, an open source penetration testing platform, on the Rapid7 blog.

He's added a DLL exploit capability to Metasploit, meaning that anyone can now study the attack and see how it works, as well as unearth more vulnerable applications.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5700
Published: 2014-09-22
Multiple cross-site scripting (XSS) vulnerabilities in Baby Gekko before 1.2.2f allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to admin/index.php or the (2) username or (3) password parameter in blocks/loginbox/loginbox.template.php to index.php. NOTE: some o...

CVE-2014-0484
Published: 2014-09-22
The Debian acpi-support package before 0.140-5+deb7u3 allows local users to gain privileges via vectors related to the "user's environment."

CVE-2014-2942
Published: 2014-09-22
Cobham Aviator 700D and 700E satellite terminals use an improper algorithm for PIN codes, which makes it easier for attackers to obtain a privileged terminal session by calculating the superuser code, and then leveraging physical access or terminal access to enter this code.

CVE-2014-3595
Published: 2014-09-22
Cross-site scripting (XSS) vulnerability in spacewalk-java 1.2.39, 1.7.54, and 2.0.2 in Spacewalk and Red Hat Network (RHN) Satellite 5.4 through 5.6 allows remote attackers to inject arbitrary web script or HTML via a crafted request that is not properly handled when logging.

CVE-2014-3635
Published: 2014-09-22
Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows remote attackers to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one m...

Best of the Web
Dark Reading Radio