An unprivileged (local) user who is able to place UXTheme.dll or any of the other DLLs loaded by the vulnerable executable in %SystemRoot%Temp gains escalation of privilege to the SYSTEM account.īasically, Skype runs DLLs from the Temp folder, which users can access without administrator rights. This executable is vulnerable to DLL hijacking: it loads at least UXTheme.dll from its application directory %SystemRoot%Temp instead from Windows' system directory. This update tool is vulnerable to DLL hjjacking, as researcher Stefan Kanthak outlines: That's because the flaw here isn't with Skype itself, but rather the tool Skype uses to find and install updates. Updating software is supposed to keep you secure, but ironically in Skype's case, updating is the problem. Here's what this exploit works, and how you can make sure you're using the safe Windows Store version of Skype.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |