Christian Sciberras wrote:

> I can't take THAT seriously. At least not all of it.
> 
> The part that interested me most:
> 
>>  4. Should I find such vulnerability in many applications as I can?
>>
>>  You should not. It's just a waste of time and your energy. Focus on most 
>> popular application types/classes.
> 
> If, say, DWM.dll is exploitable, why not point *that* out rather than
> point out the many applications that are using it (wrongly)?

ANY DLL is/may be exploitable when referenced without its (often
well-known) complete pathname.
It IS necessary to name all the applications with unqualified
references and to have them fixed by their authors/vendors.

And there are MANY places where DLLs or EXEs are referenced, not just
in binaries: the registry, DESKTOP.INI files (especially in the start
menu and %ProgramFiles%), batch files (do you reference CMD.EXE always
as %SystemRoot%\System32\CMD.EXE? No? It really doesn't hurt!), scripts
(including AUTORUN.INF.-), ...

Stefan


> Oh, and the "report". For obvious reasons, I cannot include the full
> report. If I missed passing any detail, just ask and I'll fix right
> away.
> 
> http://img189.imageshack.us/img189/4801/31998033.png
> 
> 
> On Thu, Sep 9, 2010 at 8:10 PM, YGN Ethical Hacker Group <li...@yehg.net> 
> wrote:
>> Hi Christian
>>
>> The reason I use "Clean" doesn't mean (or I'm not accusing) your
>> Windows is infected.
>> It's better to test DLL Hijacking in Clean Copy of Windows without any
>> prior applications messup.
>>
>> Please take a look at
>> http://core.yehg.net/lab/pr0js/texts/when_testing_for_dll_hijacking.txt
>>
>> We thank ACROS Security for bringing life to this issue.
>> We'll take social responsibility as a security community to stop this
>> issue as much as we could.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to