Skip to content

Installer: Prevent DLL hijacking attack #72

@ge0rdi

Description

@ge0rdi

DLL hijacking (planting) attack exploits the fact that by default DLLs are loaded from the same folder as main executable file (when relative path is used to load DLL).

This is further mitigated by KnownDLLs. Those DLLs are always loaded from system folder no matter if they are present in executable's folder or not.

Open-Shell installer depends on version.dll that is not part of KnownDlls and thus it is vulnerable to DLL hijacking attack.

Malicious site can trick the user to download malicious DLL into his download folder. And if that user will download also Open-Shell installer and run it, malicious DLL may get loaded and executed.

The solution would be to get rid of version.dll dependency.
If not possible to eliminate it completely then we should at least not link to in statically and load the DLL during run-time using full path.

Metadata

Metadata

Assignees

Labels

securitySecurity related issue

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions