Nmap Development mailing list archives
NMAP 7.12- DLL Hijacking Privilege Escalation.
From: Nitesh Shilpkar <shilpkar.nitesh () gmail com>
Date: Sat, 16 Jul 2016 15:33:29 +0530
NMAP setup for windows suffers from a DLL hijacking privilege escalation vulnerability. The "NMAP" loads and executes dll from its "application directory". For software downloaded with a web browser the application directory is typically the user's "Downloads" directory: see < https://insights.sei.cmu.edu/cert/2008/09/carpet-bombing-and-directory-poisoning.html>,< http://blog.acrossecurity.com/2012/02/downloads-folder-binary-planting.html> and <http://seclists.org/fulldisclosure/2012/Aug/134> for "prior art" about this well-known and well-documented vulnerability. If an attacker places malicious DLL in the user's "Downloads" directory (for example per "drive-by download" or "social engineering") this vulnerability becomes a remote code execution. Proof of concept/demonstration: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 1. Create a malicious dll file and save it to your "Downloads" directory in a GUEST account. 2. Download the latest NMAP version 7.1.2. 3. Click on the Windows NMAP setup for windows.. 4. UAC settings would ask for a password, as the victim supplies with the password to run the setup. 5. A remote shell with Administrative privileges is opened. Thanks and Regards,
_______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- NMAP 7.12- DLL Hijacking Privilege Escalation. Nitesh Shilpkar (Jul 17)
- Re: NMAP 7.12- DLL Hijacking Privilege Escalation. Daniel Miller (Jul 18)
