Bugtraq mailing list archives

RE: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer


From: "Oliver Lavery" <olavery () pivx com>
Date: Mon, 9 Feb 2004 17:42:29 -0500

Topic
LoadLibrary / LoadLibraryEx Weakness

        While the 'attack' described in this vuln is quite feasible, it's
not confined to windows, nor does it require the use of LoadLibrary(Ex)?.

        There are in fact two issues here:

1) runtime dynamic linking mechanisms generally make use of a search path.
If you have full control of a machine, or the system uses sufficiently lax
filesystem priviledged, it's quite easy to place your own dynamic library (a
DLL on windows or a .so on *nix) earlier in the search path than a system
library. Windows does unfortunately include a process' working directory as
the first directory in this search path, which is a weakness somewhat
particular to that platform.

2) Process boundaries are not security boundaries. All the processes a user
is running have essentially unrestricted access to each other on both
Windows and *nix variants. Even without dynamic linking tricks, there are
functions on both Windows and *nix platforms that can be used to modify any
process a user is running, to achieve essentially any end an attacker
desires. On windows, code injection techniques that do not require DLLs are
well known and there's plenty of example code in the aether.

        It's very debatable whether or not this is a bad thing. I feel that
there should be some way to enforce security across process boundaries, and
doing so could make a lot of security schemes that are trivial to bypass
actually be somewhat effective ( DRM being one example ). In a thread on
Bugtraq a year ago, a lot of people disagreed for some pretty good reasons.

        Regardless of where you stand on the issue, this vuln is nothing
new, it's just a weakness in how most OSs are designed right now. 

I. Malicious DLL can be delivered using the following typical ‘delivery
techniques’:
1.     Any un-patched remotely exploitable BOF vulnerability;
2.     Any new program users download and run from the Internet; and
3.     Any un-patched web-browser vulnerability allowing targeted file
saving
within scripts.

        If any of these are true, you can achieve exactly what OSSec is
describing, without having to bother with the complexity of a proxy DLL...

         OS Security has taken the red pill, but has yet to realize how deep
the rabbit hole goes.

Cheers,
~x

---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.577 / Virus Database: 366 - Release Date: 03/02/2004
 


Current thread: