New Variant of DLL Search Order Hijacking Bypasses Windows 10 and 11 Protections

Discussion in 'other security issues & news' started by stapp, Jan 2, 2024.

  1. stapp

    stapp Global Moderator

    Joined:
    Jan 12, 2006
    Posts:
    27,171
    Location:
    UK
    https://thehackernews.com/2024/01/new-variant-of-dll-search-order.html

    Also see
    https://www.securityjoes.com/post/h...closet-unmasking-the-winsxs-hijacking-hideout
     
  2. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    9,147
    Location:
    USA
    This is a problem that should have been solved before either Windows 10 or 11 existed.
     
  3. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,100
    Location:
    Canada
    An adversary needs to write the malicious dll into some directory that is part of the search order. i didn't see it mentioned how they typically do this, but maybe I missed it.
     
  4. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    9,147
    Location:
    USA
    An interesting article on a dll hijack, at least one that I thought was safe to post here. A little googling will find some more interesting ones.
    Bypassing CVE-2018-15442: Another Case of DLL Hijacking (coresecurity.com)
     
  5. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,648
    Location:
    U.S.A.
    From the Hacker News article;
     
  6. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,100
    Location:
    Canada
  7. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    I honestly still don't understand why M$ can't seem to fix this problem, I'm sure they can come up with something? Like whitelisting DLL's in certain folders (all other ones aren't allowed), or simply denying DLL's from being copied into certain folders?
     
  8. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,100
    Location:
    Canada
    Probably because they brush it aside as being a trivial - to themselves at least - concern. Just like they ditch (deprecate) features they feel are now worthless and nobody wants :rolleyes:
     
  9. novirusthanks

    novirusthanks Developer

    Joined:
    Nov 5, 2010
    Posts:
    1,363
    Location:
    Italy
  10. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,100
    Location:
    Canada
  11. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    9,147
    Location:
    USA
    The best thought I have would be to make them specify a path and digitally sign it. But, easier said than done.
     
  12. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    I don't claim to understand all about this DLL hijacking stuff, but I'm sure MS can come up with something. For example, HitmanPro.Alert has implemented protection for this stuff, and I'm sure it doesn't cover every DLL attack method, but it's better than nothing.

    Interesting stuff, thanks! Very cool that OSArmor can block this particular attack.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.