BugTraq
Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 09 2004 06:24PM
Disclosure From OSSI (disclosure ossecurity ca) (4 replies)
RE: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 09 2004 10:42PM
Oliver Lavery (olavery pivx com)
> Topic
> LoadLibrary / LoadLibraryEx Weakness

While the 'attack' described in this vuln is quite feasible, it's
not confined to windows, nor does it require the use of LoadLibrary(Ex)?.

There are in fact two issues here:

1) runtime dynamic linking mechanisms generally make use of a search path.
If you have full control of a machine, or the system uses sufficiently lax
filesystem priviledged, it's quite easy to place your own dynamic library (a
DLL on windows or a .so on *nix) earlier in the search path than a system
library. Windows does unfortunately include a process' working directory as
the first directory in this search path, which is a weakness somewhat
particular to that platform.

2) Process boundaries are not security boundaries. All the processes a user
is running have essentially unrestricted access to each other on both
Windows and *nix variants. Even without dynamic linking tricks, there are
functions on both Windows and *nix platforms that can be used to modify any
process a user is running, to achieve essentially any end an attacker
desires. On windows, code injection techniques that do not require DLLs are
well known and there's plenty of example code in the aether.

It's very debatable whether or not this is a bad thing. I feel that
there should be some way to enforce security across process boundaries, and
doing so could make a lot of security schemes that are trivial to bypass
actually be somewhat effective ( DRM being one example ). In a thread on
Bugtraq a year ago, a lot of people disagreed for some pretty good reasons.

Regardless of where you stand on the issue, this vuln is nothing
new, it's just a weakness in how most OSs are designed right now.

>I. Malicious DLL can be delivered using the following typical ?delivery
>techniques?:
>1. Any un-patched remotely exploitable BOF vulnerability;
>2. Any new program users download and run from the Internet; and
>3. Any un-patched web-browser vulnerability allowing targeted file
saving
>within scripts.

If any of these are true, you can achieve exactly what OSSec is
describing, without having to bother with the complexity of a proxy DLL...

OS Security has taken the red pill, but has yet to realize how deep
the rabbit hole goes.

Cheers,
~x

---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.577 / Virus Database: 366 - Release Date: 03/02/2004

[ reply ]
RE: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 09 2004 10:01PM
David Schwartz (davids webmaster com) (1 replies)
Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 10 2004 03:51AM
Darren Reed (avalon caligula anu edu au) (1 replies)
Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 10 2004 09:10PM
der Mouse (mouse Rodents Montreal QC CA) (3 replies)
Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 11 2004 06:11AM
Darren Reed (avalon caligula anu edu au) (1 replies)
Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 11 2004 07:07AM
der Mouse (mouse Rodents Montreal QC CA) (1 replies)
Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 11 2004 08:44AM
Darren Reed (avalon caligula anu edu au) (1 replies)
Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 11 2004 09:03AM
der Mouse (mouse Rodents Montreal QC CA)
Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 11 2004 04:04AM
Glynn Clements (glynn clements virgin net)
Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 11 2004 12:28AM
John D. Hardin (jhardin impsec org) (1 replies)
Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 11 2004 04:56AM
der Mouse (mouse Rodents Montreal QC CA)
RE: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 09 2004 07:31PM
Ward Taylor (rfdhomer windyplains com) (2 replies)
Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 10 2004 04:40PM
Nexus (nexus patrol i-way co uk)
Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 10 2004 10:31AM
Peter Pentchev (roam ringlet net)
Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer Feb 09 2004 07:20PM
Seth Arnold (sarnold wirex com)


 

Privacy Statement
Copyright 2010, SecurityFocus