Twenty Year Anniversary

Spider Player 2.5.3 DLL Hijacking

Spider Player 2.5.3 DLL Hijacking
Posted Jul 29, 2017
Authored by Ye Yint Min Thu Htut

Spider Player version 2.5.3 suffers from a dll hijacking vulnerability.

tags | advisory
systems | windows
MD5 | af72530d6843a4b774d276db0bacc5c4

Spider Player 2.5.3 DLL Hijacking

Change Mirror Download
Author: Ye Yint Min Thu Htut


1. OVERVIEW

The Spider Media Player is vulnerable to Insecure DLL Hijacking
Vulnerability. Similar terms that describe this vulnerability
have been come up with Remote Binary Planting, and Insecure DLL
Loading/Injection/Hijacking/Preloading.


2. PRODUCT DESCRIPTION

Spider Player is a skinnable audio player with full support for all major
audio formats: MP3, AAC, WMA, OGG, FLAC and others. Its most interesting
features include audio streaming, integration with Shoutcast and Icecast
radio directories, lossless Internet radio recording, advanced CD Ripping
and Converting capabilities, FreeDB integration, 32-sound processing for
crystal-clear sound, customizable local and global hotkeys and crossfading
support. Spider Player is small and blazingly fast, and uses very few
system resources.

3. VULNERABILITY DESCRIPTION

The Spider Media player application passes an insufficiently qualified path
in
loading an external library when a user launch the application

Affected Library List
---------------------
# dwmapi.dll
# olepro32.dll
# dsound.dll
# AUDIOSES.dll

4. VERSIONS AFFECTED

2.5.3 and prior

5. PROOF-OF-CONCEPT/EXPLOIT

http://blog.pentest.space/2017/07/spider-player-253-unsafe-dll-loading.html

Tested Platform: Windows 7 x64 (Fresh Windows)

6. IMPACT

This occurs when an application fails to resolve a DLL because the DLL does
not exist in the specified path or search directories. If this happens, a
malicious Dll with the same name can be placed in the specified path
directory leading to remote code execution.


7. SOLUTION

For application developers:
Require set paths for DLLs in applications

For system administrators:
Disable write permissions to relative application folders
Utilize least privilege access to prevent users (and applications) from
having too much access to the system

For both groups:
Microsoft has a great article explaining the DLL-related registry keys
and how they can be used to protect applications -
http://blogs.technet.com/b/srd/archive/2010/08/23/more-
information-about-dll-preloading-remote-attack-vector.aspx


8. VENDOR

VIT
https://spider-player.en.softonic.com/
http://spider-player.com/contact

9. CREDIT

This vulnerability was discovered by Ye Yint Min Thu htut,
http://pentest.space

10. DISCLOSURE TIME-LINE

07-26-2017: vulnerability discovered
07-26-2010: notified vendor [ vendor's website was no long avaiable ]
07-26-2017: reported to cert.org for coordination
08-29-2017: vulnerability disclosed

11. REFERENCES
https://support.microsoft.com/en-us/help/2389418/secure-
loading-of-libraries-to-prevent-dll-preloading-attacks
https://cwe.mitre.org/data/definitions/427.html

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

September 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    3 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    18 Files
  • 6
    Sep 6th
    18 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    2 Files
  • 9
    Sep 9th
    2 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    17 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    29 Files
  • 14
    Sep 14th
    21 Files
  • 15
    Sep 15th
    3 Files
  • 16
    Sep 16th
    1 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    16 Files
  • 19
    Sep 19th
    29 Files
  • 20
    Sep 20th
    18 Files
  • 21
    Sep 21st
    5 Files
  • 22
    Sep 22nd
    2 Files
  • 23
    Sep 23rd
    2 Files
  • 24
    Sep 24th
    15 Files
  • 25
    Sep 25th
    30 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close