Vigil@nce - F-Secure Anti-Virus: executing DLL code via the installer
July 2019 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer...
SYNTHESIS OF THE VULNERABILITY
An attacker can create a malicious install DLL, and then put it in the current directory of F-Secure Anti-Virus, in order to execute code.
Impacted products: F-Secure AV.
Consequences: administrator access/rights, privileged access/rights.
Provenance: intranet server.
Confidence: confirmed by the editor (5/5).
Creation date: 16/05/2019.
DESCRIPTION OF THE VULNERABILITY
The F-Secure Anti-Virus product uses external shared libraries (DLL).
However, if the working directory contains a malicious install DLL, it is automatically loaded.
An attacker can therefore create a malicious install DLL, and then put it in the current directory of F-Secure Anti-Virus, in order to execute code.
ACCESS TO THE FULL VIGIL@NCE BULLETIN