navigation bar left navigation bar right

Secunia CSI7
navigation left tab Advisories navigation right tab
navigation left tab Research navigation right tab
navigation left tab Forums navigation right tab
navigation left tab Create Profile navigation right tab
navigation left tab Our Commitment navigation right tab
PSI
PSI API
CSI
OSI
xSI
Vulnerabilities
Programs
Open Discussions
My Threads
Create Thread
Statistics
About

Forum Thread: Microsoft Windows Insecure Library Loading

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Open Discussions

See the original Secunia blog entry:
Microsoft Windows Insecure Library Loading

Secunia Microsoft Windows Insecure Library Loading
Secunia Official 25th Aug, 2010 08:04
Ranking: 0
Posts: 0
User Since: -
System Score: -
Location: Copenhagen, DK
For the past week, there has been quite a stir about a new class of vulnerabilities or rather a new, remote vector for exploiting an old class of vulnerabilities: Insecure library loading.

wang01

RE: Microsoft Windows Insecure Library Loading
[+]
This reply has been minimised due to a negative Relevancy Score.
Anthony Wells RE: Microsoft Windows Insecure Library Loading
Expert Contributor 26th Aug, 2010 11:51
Score: 2463
Posts: 3,348
User Since: 19th Dec 2007
System Score: N/A
Location: N/A
Last edited on 26th Aug, 2010 11:51

As someone with just enough IT knowledge to be dangerous , I find this level of "unknown" insecurity to be very disconcerting :ie: 200 or more - so far - unnamed programmes likely to be exploitable .

With my (less than) average technical skill levels , I would not be overconfident of applying the M$ "tool" workaround(s) to my single PC with XP SP3 . Rightly or wrongly , it appears to me that I am less at risk because I am not connected to a network ; perhaps someone can qualify this ??

Firefox has just been implicated and is seemingly the first programme to affect me directly :-

http://secunia.com/advisories/41095/

So for now I shall be putting my faith in Secunia to keep me advised of when/if any other of my programmes display the vulnerability . It's easily the best defence I can find to suit my level of competence .

Quite what people without (access) to Secunia are going to do , I have no idea , but I doubt blind faith is the answer for today .

Take extra care

Anthony


--


It always seems impossible until its done.
Nelson Mandela
Was this reply relevant?
+4
-2

Mondeo

RE: Microsoft Windows Insecure Library Loading
[+]
This reply has been minimised due to a negative Relevancy Score.
smurphdude RE: Microsoft Windows Insecure Library Loading
Contributor 29th Aug, 2010 08:50
Score: 107
Posts: 40
User Since: 13th Aug 2010
System Score: 100%
Location: UK
Last edited on 29th Aug, 2010 08:51
An unofficial list of applications affected by this vulnerability including those that have released a patch to date (VLC mediaplayer and uTorrent) can be found here.

http://www.corelan.be:8800/index.php/2010/08/25/dl...
Was this reply relevant?
+5
-4

gracegracegrace

RE: Microsoft Windows Insecure Library Loading
[+]
This reply has been minimised due to a negative Relevancy Score.
ddmarshall RE: Microsoft Windows Insecure Library Loading
Dedicated Contributor 1st Sep, 2010 15:53
Score: 1219
Posts: 971
User Since: 8th Nov 2008
System Score: 98%
Location: UK
Microsoft have issued an article explaining how this vulnerability can be exploited.
http://blogs.technet.com/b/srd/archive/2010/08/31/...

The knowledge base article has also been updated to include an automatic Fixit which blocks attacks from remote locations.
http://support.microsoft.com/kb/2264107
The workaround tool must be installed before running the Fixit.

--
This answer is provided “as-is.” You bear the risk of using it.
Was this reply relevant?
+1
-0
edubr2010 RE: Microsoft Windows Insecure Library Loading
Member 18th Sep, 2010 13:15
Score: 1
Posts: 3
User Since: 13th Mar 2010
System Score: N/A
Location: BR
Last edited on 18th Sep, 2010 13:15
The remote vector has been known for ages. How come Microsoft have not realised it before ?

If you see this vulnerability: http://secunia.com/advisories/38916/
It uses the exact same "technique".
Was this reply relevant?
+0
-0
double0fox RE: Microsoft Windows Insecure Library Loading
Member 11th Oct, 2010 08:57
Score: 0
Posts: 1
User Since: 11th Oct 2010
System Score: N/A
Location: US
on 1st Sep, 2010 15:53, ddmarshall wrote:
Microsoft have issued an article explaining how this vulnerability can be exploited.
http://blogs.technet.com/b/srd/archive/2010/08/31/...

The knowledge base article has also been updated to include an automatic Fixit which blocks attacks from remote locations.
http://support.microsoft.com/kb/2264107
The workaround tool must be installed before running the Fixit.


Fix includes results for multiple versions of windows and uses Microsoft Fix It, and a hotfix for each respective OS.
Was this reply relevant?
+0
-0


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


Secunia is a member of FIRST Secunia is a member of EDUcause Secunia is a member of The Open Group Secunia is a member of FS-ISAC
 
Secunia © 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer
follow Secunia on Facebook follow Secunia on Twitter follow Secunia on LinkedIn follow Secunia on YouTube follow Secunia Xing follow Secunias RSS feed follow Secunia on Google+