Homeland Secure IT Alert #3 for Thursday, August 26, 2010
Not to be outdone by the Apple Mac OS X security issues, Microsoft has a few new issues as well. This time regarding DLL handling.
What follows is the original posting from US-CERT:
National Cyber Alert System
Technical Cyber Security Alert TA10-238A
Microsoft Windows Insecurely Loads Dynamic Libraries
Original release date: August 26, 2010
Last revised: —
Any application running on the Microsoft Windows platform that
uses dynamically linked libraries (DLLs) may be affected. Whether
or not an application is vulnerable depends on how it
specifically loads a DLL. Please see the Vendor Information
section of Vulnerability Note VU#707943 for information about
Due to the way Microsoft Windows loads dynamically linked libraries
(DLLs), an application may load an attacker-supplied DLL instead of
the legitimate one, resulting in the execution of arbitrary code.
Microsoft Windows supports dynamically linked libraries (DLLs) that
are loaded when needed by an application. DLLs are typically loaded
when the application is first started; however DLLs may be loaded
and unloaded while the application is running. An application can
request a DLL file in a variety of ways, and Windows uses several
different search algorithms to find DLL files. The interaction
between the application and Windows can result in a DLL file being
loaded from the current working directory of the application,
instead of the Windows system directory or the directory where the
application is installed.
The current working directory could be the desktop, a removable
storage device such as a USB key, a Windows file share, or a WebDAV
location. When a file associated with an application is opened, a
DLL in the same directory as the file may be loaded. Although an
attacker may not have permission to write to the Windows system or
application directories, the attacker may be able to write a DLL to
a directory used to store files, or the attacker could provide
their own directory.
Attacks against this type of vulnerability have been referred to as
“binary planting.” Please see Vulnerability Note VU#707943 and
Microsoft Security Advisory 2269637 for more information.
By placing a DLL with the correct name (and possibly the relative
directory path) in the current working directory, an attacker could
execute arbitrary code with the privileges of the application that
loads the DLL.
Individual applications that run on the Windows platform may
require patches or updates. Microsoft Knowledge Base article
KB2264107 describes an update that provides a registry key that can
prevent Windows from searching the current working directory for
Information about specific solutions for different vendors, general
mitigation techniques, and secure ways for applications to load
DLLs can be found in the Vendor Information and Solution sections
of Vulnerability Note VU#707943.
* Vulnerability Note VU#707943 –
* Microsoft Security Advisory (2269637) –
* A new CWDIllegalInDllSearch registry entry is available to control
the DLL search path algorithm –
The most recent version of this document can be found at:
Feedback can be directed to US-CERT Technical Staff. Please send
email to with “TA10-238A Feedback VU#707943” in
For instructions on subscribing to or unsubscribing from this
mailing list, visit .
Produced 2010 by US-CERT, a government organization.
August 26, 2010: Initial release
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1.4.5 (GNU/Linux)
—–END PGP SIGNATURE—–
If you have questions or need assistance with this issue, please call 864.990.4748 or email email@example.com