Full Disclosure mailing list archives

Re: Nmap NOT VULNERABLE to Windows DLL Hijacking Vulnerability


From: Rohit Patnaik <quanticle () gmail com>
Date: Wed, 8 Sep 2010 20:52:33 -0500

One problem with your scenario: any person sophisticated enough to know what
nmap is (much less use it) is going to be just a little suspicious about
running nmap on some random "data file" that you send them.

--Rohit Patnaik

On Wed, Sep 8, 2010 at 8:29 PM, <paul.szabo () sydney edu au> wrote:

jf <jf () ownco net> wrote:

... my understanding of the issue was not the default library search
path, but rather that people are using SearchPath() or similar to locate
DLLs which they then pass to LoadLibrary() ...

And, people loading DLLs they do not need, for OS version detection.
(Maybe others?)

... I can't see anyone opening a URL with nmap itself ...

An "exploit scenario" for nmap: send a ZIP (or somesuch) archive to
the victim, containing a data file and a "hidden" DLL, with message:
 Hey, these seem infected with conficker, check with nmap
and the victim using "nmap -iL datafile" from current dir.

Cheers, Paul

Paul Szabo   psz () maths usyd edu au   http://www.maths.usyd.edu.au/u/psz/
School of Mathematics and Statistics   University of Sydney    Australia

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: