Stop Microsoft
Welcome,
Guest
. Please
login
or
register
.
Have you missed your
activation email
?
1 Hour
1 Day
1 Week
1 Month
Forever
Login with username, password and session length.
News:
Home
Help
Login
Register
Stop Microsoft
»
All Things Microsoft
»
Microsoft as a Company
»
Windows DLL load hijacking exploits go wild
« previous
next »
Print
Pages: [
1
]
Go Down
Author
Topic: Windows DLL load hijacking exploits go wild (Read 2365 times)
reactosguy
Member
Posts: 269
Kudos: 2
Windows DLL load hijacking exploits go wild
«
on:
28 August 2010, 17:37 »
http://www.reuters.com/article/idUS2168761020100825?loomia_ow=t0:s0:a49:g43:r1:c0.126374:b36893430:z0
Microsoft says that it could not patch Windows because that would cripple applications, yet forty-one of Microsoft's own programs are vulnerable to DLL load hijacking.
Many Windows applications don't call DLLs using the full pathname, but instead use only the filename. However, hackers can exploit the applications by fooling the application into loading a malicious file with the same name as a required DLL.
Logged
Contribute to the Get Rid of Microsoft Guide!
Anti-MS humour
Misc. humour
VISTA SUCKS
Google's worst ads
Microsoft SINK
Linux Genuine Advantage
Lead Head
Global Moderator
Member
Posts: 1,508
Kudos: 534
Re: Windows DLL load hijacking exploits go wild
«
Reply #1 on:
28 August 2010, 17:57 »
I've heard of attacks like this before. I remember reading about one that compromised an Explorer.exe DLL, making it nearly impossible to find (or even know) that there was an issue.
Logged
sig.
Print
Pages: [
1
]
Go Up
« previous
next »
Stop Microsoft
»
All Things Microsoft
»
Microsoft as a Company
»
Windows DLL load hijacking exploits go wild