[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Executable installers are vulnerable^WEVIL (case 15): F-SecureOnlineScanner.exe allows arbitrary (remote) code execution and escalation of privilege
F-Secure's online virus scanner F-SecureOnlineScanner.exe, available
loads and executes several rogue/bogus DLLs (UXTheme.dll, HNetCfg.dll,
RASAdHlp.dll, SetupAPI.dll, ClbCatQ.dll, XPSP2Res.dll, CryptNet.dll,
OLEAcc.dll etc.) eventually found in the directory it is started from
(the "application directory").
For software downloaded with a web browser the application directory
is typically the user's "Downloads" directory: see
Due to the application manifest embedded in the executable which
specifies "requireAdministrator" the installer is started with
administrative privileges ("protected" administrators are prompted
for consent, unprivileged standard users are prompted for an
administrator password); execution of any hijacked DLL results in
an escalation of privilege!
See <http://seclists.org/fulldisclosure/2015/Nov/101> and
<http://home.arcor.de/skanthak/sentinel.html> and the still unfinished
<http://home.arcor.de/skanthak/!execute.html> for more details and why
executable installers (and self-extractors too) are bad.
F-Secure published a security advisory
and made an updated version of their online scanner available on
CAVEAT: F-Secure's fix works only on Windows Vista and newer versions;
the vulnerability is still present on earlier versions of