IDNetters Forums

Technical News & Discussion => Windows News & Discussion => Topic started by: Simon on Aug 24, 2010, 12:43:00

Title: Microsoft admits new attack route for massive DLL flaw
Post by: Simon on Aug 24, 2010, 12:43:00
Microsoft has confirmed a new way of using an old DLL flaw could leave third-party applications - as well as its own - open to attack.

When applications load dynamic link libraries where the programmer has been sloppy and not used the full path name, an attacker can hijack the process to load his own code.

Such DLL uploading techniques are well-known to Microsoft, but the new method adds the ability to attack via a shared network drive, meaning the hack could be undertaken remotely.

Read more: http://www.pcpro.co.uk/news/security/360547/microsoft-admits-new-attack-route-for-massive-dll-flaw
Title: Re: Microsoft admits new attack route for massive DLL flaw
Post by: Rik on Aug 24, 2010, 13:46:18
Do they never fix things properly. :sigh:
Title: Re: Microsoft admits new attack route for massive DLL flaw
Post by: Glenn on Aug 24, 2010, 13:54:00
And put themselves out of a job  ;)
Title: Re: Microsoft admits new attack route for massive DLL flaw
Post by: Rik on Aug 24, 2010, 15:29:47
Good point. ;D
Title: Re: Microsoft admits new attack route for massive DLL flaw
Post by: esh on Aug 25, 2010, 21:08:24
Hard to say if it's MS or the programmers at fault here. I guess it's easy to overlook from the programmer's point of view. You can imagine just coding it like that while testing/building and then never neatening it up because it worked.

I always found it interesting how on Unix systems to run a program in your current directory like 'myapp' you could not simply type 'myapp' and press enter to run it, just in case another program of the same name had been maliciously inserted there when you expected something else to run. You have to explicitly do './myapp'. Annoyance or security?