Vigil@nce - Microsoft Skype: executing DLL code via api-ms-win-core-winrt-string-l1-1-0.dll
May 2017 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can create a malicious api-ms-win-core-winrt-string-l1-1-0.dll
DLL, and then put it in the current directory of Microsoft Skype,
in order to execute code.
Impacted products: Skype for Business.
Severity: 2/4.
Creation date: 17/03/2017.
DESCRIPTION OF THE VULNERABILITY
The Microsoft Skype product uses external shared libraries (DLL).
However, if the working directory contains a malicious
api-ms-win-core-winrt-string-l1-1-0.dll DLL, it is automatically
loaded.
An attacker can therefore create a malicious
api-ms-win-core-winrt-string-l1-1-0.dll DLL, and then put it in
the current directory of Microsoft Skype, in order to execute code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN