Format Factory 4.1.0 DLL Hijacking

2017.08.05
Credit: Kyaw Thiha
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

Format Factory DLL Hijacking Vulnerability Product --------------- Format Factory is a comprehensive audio, video and photo converter and ripper that will satisfy your every need, all by having simple interface that can be used by everyone. Download Format Factory Offline Installer Setup for Windows. Vulerability Description ----------------- Format factory is vulnerable to Insecure DLL Hijacking Vulnerability. Similar terms that describe this vulnerability have been come up with Remote Binary Planting, and Insecure DLL Loading/Injection/Hijacking/Preloading. DLL Hijacking is an attack that exploits the way some Windows applications search and load Dynamic Link Libraries. Affected Library List --------------------- - msimg32.dll - WindowsCodecs.dll - dwmapi.dll Version Affect --------- 4.1.0 Tested Platform: Windows 7 x86 POC -------------- http://www.kth.ninja/2017/08/format-factory-dll-hijacking.html Impact ----------- This occurs when an application fails to resolve a DLL because the DLL does not exist in the specified path or search directories. If this happens, a malicious Dll with the same name can be placed in the specified path directory leading to remote code execution. Remediation ----------------- Require set paths for DLLs in applications http://blogs.technet.com/b/srd/archive/2010/08/23/more-information-about-dll-preloading-remote-attack-vector.aspx Vendor --------- Format Factory http://www.pcfreetime.com/formatfactory/ Found By ------------------ Kyaw Thiha Reference --------------- https://support.microsoft.com/en-us/help/2389418/secure-loading-of-libraries-to-prevent-dll-preloading-attacks https://cwe.mitre.org/data/definitions/427.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top