Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: Cybsec Advisory 2011 0901 Windows Script Host DLL Hijacking
From: paul.szabo () sydney edu au
Date: Mon, 5 Sep 2011 08:54:46 +1000

Application: wscript.exe
Extensions: js, jse, vbe, vbs, wsf, wsh
Library: wshesn.dll

Many people commented that the above extensions are "executable"
already, so are (should be) treated with caution, or that they
can be trojaned directly without any DLL load shenanigans.

However... looking at
http://technet.microsoft.com/en-us/library/cc288335%28office.12%29.aspx
http://office.microsoft.com/en-us/windows-sharepoint-services-help/types-of-files-that-cannot-be-added-to-a-list-or-library-HA010100147.aspx
I do not see JS listed as executable, though JSE is listed.

Looking at
http://msdn.microsoft.com/en-us/library/ms722429.aspx
I see JS (but not JSE) listed. Checking secpol.msc on my WindowsXP
machine, none of the above extensions are "designated".

Maybe DLL hijacking is useful for some of these file types, after all?

Cheers, Paul

Paul Szabo   psz () maths usyd edu au   http://www.maths.usyd.edu.au/u/psz/
School of Mathematics and Statistics   University of Sydney    Australia

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]