Jump to content

Sachin

Members
  • Content Count

    8
  • Joined

  • Last visited

Posts posted by Sachin


  1. Hi Ritchie,

     

    Attacker can exploit the vulnerability to load a DLL file of the attacker's choosing that could execute arbitrary code. 

     

    I think in the POC video I shown execution of calc.exe through affected software. 

     

    An attacker gain access to the system if attackers creates shell as a DLL instead of calc (dll) that i shown in the video.

     

    If you are interested I will shown the same. How attacker will gain access to the system and control it. 

     

    Thanks,

     

    Sachin Wagh

  2. Security Advisory - Immunet Antivirus DLL Hijacking Vulnerability

     

    Summary

     

    Immunet® is a malware and antivirus protection system that utilizes cloud computing to provide enhanced community-based security.

     

    Immunet Antivirus contains a DLL hijacking vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system. This vulnerability exists due to some DLL file is loaded by ‘ImmunetSetup.exe’ improperly. And it allows an attacker to load this DLL file of the attacker’s choosing that could execute arbitrary code without the user's knowledge.

     

    Affected Product:

     

    Immunet 3

     

    Download Link: https://s3.amazonaws.com/immunet-site/production/ImmunetSetup.exe

     

    Impact

     

    Attacker can exploit the vulnerability to load a DLL file of the attacker's choosing that could execute arbitrary code. This may help attacker to Successful exploits the system if user creates shell as a DLL.

     

    Vulnerability Scoring Details

     

    The vulnerability classification has been performed by using the CVSSv2 scoring system (http://www.first.org/cvss/).

    Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)

     

    Technique Details

     

    1. Prerequisite:

    The attacker can access the device;

    2. Attacking procedure:

    This vulnerability exists due to the way DLL files are loaded by Immunet Antivirus. It allows an attacker to load a DLL file of the attacker’s choosing that could execute arbitrary code without the user's knowledge. The specific flaw exists within the handling of some DLL file loading by the Immunet Antivirus process.

     

    Note : For more detail POC please check the mail send on support@immunet.com

     

    Credit:

     

    Sachin Wagh (tiger_tigerboy)

     

    Wsachin092@gmail.com

    post-33415-0-25624200-1467403604_thumb.png

×
×
  • Create New...