Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CYBER-DANGER    |    Internet security and threats    |    46 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 3 of 46    |
|    August Abolins to All    |
|    DLL search order vulnerability    |
|    18 Apr 11 23:46:44    |
      Almost a year later... but is this issue resolved?       =================================================                     Path: news.grc.com!.       Newsgroups: grc.news.latestversions,grc.security       Subject: DLL search order vulnerability       Date: Sun, 29 Aug 2010 14:32:30 -0700              About the recent MS article:       ----------------------------       http://support.microsoft.com/kb/2264107       The workaround presented here is not a patch, and can break some applications,       namely Microsoft Outlook and Google Chrome, according to commenters on the       SANS piece below.       http://isc.sans.edu/diary.html?storyid=9445                     ---------------------------       About the DLL search order:       ---------------------------       If a DLL is called from an application, and it is not called explicitly called       (full path to the DLL), then Windows searches a series of location until it       finds a file with a matching name.       1. The directory from which the application loaded       2. The system directory       3. The 16-bit system directory       4. The Windows directory       5. The current working directory (CWD)       6. The directories that are listed in the PATH environment variable              Programs that call a DLL with a complete path to the file avoid the search       order issue, and are not vulnerable to this exploit.              Programs that do not use a complete path to the DLL are at risk especially if       the DLL being called is not a standard Windows DLL found in the first 4       locations above.                     ------------------------------------       Contributary factors in the exploit:       ------------------------------------       1. Data files are associated with specific applications by the file extension.       2. File extensions are hidden by default in Windows.       3. DLL files are hidden by default in Windows.                     -------------------------------------------------------------       The current working directory (CWD) and associated datafiles:       -------------------------------------------------------------       This is the crux of the issue.       By double-clicking a data file from some location (a local directory, network       directory, removable media, etc), the associated application is launched with       the CWD being the directory containing the datafile. If that directory also       contains a DLL that has the same name as one called by the application, and       that DLL is not found in the first 4 locations, the DLL can be loaded from the       directory containing the datafile, the CWD.                     -----------------------------------------------------       The Microsoft work-around and Microsoft Outlook 2003:       -----------------------------------------------------       One of the folks who posted comments on the SANS article above determined that       Microsoft Outlook does something rather bizarre when it loads. It changes its       CWD to a directory under "C:\Program Files\Common Files\System" in order to       load MSMAPI32.DLL.       Consequently applying the Microsoft work-around to fix the vulnerability       causes Outlook to fail loading the MSMAPI32 DLL.                     ------------------------------------------------------------       Flash drives, network drives, and ZIP files most vulnerable:       ------------------------------------------------------------       Though YOUR COMPUTER may be virus-free and fully patched, if you open a       datafile associated with one of the vulnerable applications, YOUR computer is       at risk of loading malicious code.              If someone you know gives you a flash drive that they've used in their       compromised computer (but they are unaware their computer is infected), and it       contains a datafile (which is clean) and the DLL (hidden by Windows by       default), then despite your computer being clean, when you double-click the       datafile, your application will load the malicious DLL from the USB flash       drive.              A similar scenario - actually much worse - applies to a large business       network. If the malware was sophisticated enough, it would look for existing       PPTX (Power Point 2007 is one of the affected applications) files on network       shares and only place the boobytrapped DLL in the same folder as the PPTX       files. Nothing would even look out of place to other network users when       exploring the folder. All it takes to get the whole network full of these       DLLs is one employee with an infected USB stick or laptop.              And, because Microsoft treats ZIP files as "folders", then packaging a benign       datafile and a malicious DLL in the same ZIP file would have the same result       as that of a flash drive or a network drive. The ZIP file would be treated as       the CWD, current working directory.              --        http://www.infoworld.com/t/anti-virus/how-thwart-the-new-dll-hijacks-539       "How to thwart the new DLL hijacks"              The main recommendation in the InfoWorld is to drag all datafiles to your       Windows "desktop" (or otherwise "known clean", free of rogue DLLs, location)       before opening them. I'm not sure how practical this is for most folks,       particularly business networks. Still, the tip should work.              -----------       Conclusion:       -----------       This could be a big problem until all the individual apps are fixed.              --- Thunderbird 2.0.0.24 (Windows/20100228)        * Origin: Fidonet Via Newsreader - http://www.easternstar.info (1:123/789)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca