[16835] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Double clicking on MS Office documents from Windows Explorer

daemon@ATHENA.MIT.EDU (Timothy J. Miller)
Tue Sep 19 20:27:28 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <87pum09l39.fsf@zoot.kelly.aftd.af.mil>
Date:         Tue, 19 Sep 2000 15:35:06 -0500
Reply-To: "Timothy J. Miller" <cerebus@SACKHEADS.ORG>
From: "Timothy J. Miller" <cerebus@SACKHEADS.ORG>
X-To:         johnl@clearoption.com
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  "John Lange"'s message of "Tue, 19 Sep 2000 14:54:24 -0500"

"John Lange" <lists@darkcore.net> writes:

> Changing the search path for DLLs would break a good portion of windows
> apps, especially legacy apps.

Absolutely.

> In my previous life as a windows programmer, often the trick to get some
> older apps working was to find the older version of some DLL that it was
> looking for and put it in the same directory as the application so it would
> load those ones instead of whatever twisted version now exists in the
> windows/system directory.

Been there, done that.  Welcome to DLL Hell.

> Thus I think we will be forced to live with this security hole though the OS
> should be patched so that it never loads DLLs across network devices or at
> least obeys the security settings of the machine.

I'm not sure how this would protect anyone.  What about systems not
using shares?  If I can poison that .ZIP you just nicked, I've still
got you.  And there remain plenty of ways I can get an arbitrary file
into a *non-system* area of your disk.

Good policy on UNIX boxen is to *never* use '.' in PATH or
LD_LIBRARY_PATH.  This is exactly what Windows is doing.

> Funny that I've known this for a very long time but never thought about
> using it to load trojan DLLs.

I should have as well, but I never did.  Oh well.  Now the fun begins,
neh?

home help back first fref pref prev next nref lref last post