what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Spider Player 2.5.3 DLL Hijacking

Spider Player 2.5.3 DLL Hijacking
Posted Jul 29, 2017
Authored by Ye Yint Min Thu Htut

Spider Player version 2.5.3 suffers from a dll hijacking vulnerability.

tags | advisory
systems | windows
SHA-256 | 1bccbf22f3a5d69e0d55a18407406335bb7aad46f8469f275593e7c17217c910

Spider Player 2.5.3 DLL Hijacking

Change Mirror Download
Author: Ye Yint Min Thu Htut


1. OVERVIEW

The Spider Media Player is vulnerable to Insecure DLL Hijacking
Vulnerability. Similar terms that describe this vulnerability
have been come up with Remote Binary Planting, and Insecure DLL
Loading/Injection/Hijacking/Preloading.


2. PRODUCT DESCRIPTION

Spider Player is a skinnable audio player with full support for all major
audio formats: MP3, AAC, WMA, OGG, FLAC and others. Its most interesting
features include audio streaming, integration with Shoutcast and Icecast
radio directories, lossless Internet radio recording, advanced CD Ripping
and Converting capabilities, FreeDB integration, 32-sound processing for
crystal-clear sound, customizable local and global hotkeys and crossfading
support. Spider Player is small and blazingly fast, and uses very few
system resources.

3. VULNERABILITY DESCRIPTION

The Spider Media player application passes an insufficiently qualified path
in
loading an external library when a user launch the application

Affected Library List
---------------------
# dwmapi.dll
# olepro32.dll
# dsound.dll
# AUDIOSES.dll

4. VERSIONS AFFECTED

2.5.3 and prior

5. PROOF-OF-CONCEPT/EXPLOIT

http://blog.pentest.space/2017/07/spider-player-253-unsafe-dll-loading.html

Tested Platform: Windows 7 x64 (Fresh Windows)

6. IMPACT

This occurs when an application fails to resolve a DLL because the DLL does
not exist in the specified path or search directories. If this happens, a
malicious Dll with the same name can be placed in the specified path
directory leading to remote code execution.


7. SOLUTION

For application developers:
Require set paths for DLLs in applications

For system administrators:
Disable write permissions to relative application folders
Utilize least privilege access to prevent users (and applications) from
having too much access to the system

For both groups:
Microsoft has a great article explaining the DLL-related registry keys
and how they can be used to protect applications -
http://blogs.technet.com/b/srd/archive/2010/08/23/more-
information-about-dll-preloading-remote-attack-vector.aspx


8. VENDOR

VIT
https://spider-player.en.softonic.com/
http://spider-player.com/contact

9. CREDIT

This vulnerability was discovered by Ye Yint Min Thu htut,
http://pentest.space

10. DISCLOSURE TIME-LINE

07-26-2017: vulnerability discovered
07-26-2010: notified vendor [ vendor's website was no long avaiable ]
07-26-2017: reported to cert.org for coordination
08-29-2017: vulnerability disclosed

11. REFERENCES
https://support.microsoft.com/en-us/help/2389418/secure-
loading-of-libraries-to-prevent-dll-preloading-attacks
https://cwe.mitre.org/data/definitions/427.html
Login or Register to add favorites

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close