Vigil@nce - F-Secure Anti-Virus: executing DLL code via the installer
July 2019 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer-vulnerability-database-and-alert
SYNTHESIS OF THE VULNERABILITY
An attacker can create a malicious install DLL, and then put it in
the current directory of F-Secure Anti-Virus, in order to execute
code.
Impacted products: F-Secure AV.
Severity: 2/4.
Consequences: administrator access/rights, privileged
access/rights.
Provenance: intranet server.
Confidence: confirmed by the editor (5/5).
Creation date: 16/05/2019.
DESCRIPTION OF THE VULNERABILITY
The F-Secure Anti-Virus product uses external shared libraries
(DLL).
However, if the working directory contains a malicious install
DLL, it is automatically loaded.
An attacker can therefore create a malicious install DLL, and then
put it in the current directory of F-Secure Anti-Virus, in order
to execute code.
ACCESS TO THE FULL VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/F-Secure-Anti-Virus-executing-DLL-code-via-the-installer-29346