Hi @ll, the executable installers of SoftMaker's FlexiPDF, and , built with the crapware known as "InnoSetup", are vulnerable to DLL hijacking: they load Windows DLLs from their "application directory" instead Windows' "system directory": on Windows 7 at least UXTheme.dll and DWMAPI.dll. This well-known and well-documented vulnerability allows arbitrary code execution with the credentials of the current user. Additionally the executable installers create an unsafe directory "%TEMP%\is-*.tmp\" to extract an executable file "flexipdf2017.tmp" or "flexipdfbasic2017.tmp" which they execute with administrative privileges. Both "flexipdf2017.tmp" and "flexipdfbasic2017.tmp" load multiple Windows DLLs from their "application directory" "%TEMP%\is-*.tmp\": on Windows 7 at least MSImg32.dll, Version.dll, MPR.dll, UXTheme.dll, DWMAPI.dll "Thanks" to the unsafe and unprotected directory "%TEMP%\is-*.tmp\" an unprivileged attacker can place these DLLs there, resulting in arbitrary code execution WITH elevation of privilege. See , and for more details. See , and plus and for these well-known and well-documented vulnerabilities. Mitigations: ~~~~~~~~~~~~ * Don't use executable installers! NEVER! Don't use self-extractors! NEVER! See and plus alias for more information. * Practice STRICT privilege separation: NEVER use the so-called "protected" administrator account(s) created during Windows setup which use the same "%TEMP%" for unprivileged and privileged processes! * Add an ACE "(D;OIIO;WP;;;WD)" to the ACL of every "%USERPROFILE%"; use to decode it to "deny execution of files in this directory for everyone, inheritable to all files in all subdirectories". stay tuned Stefan Kanthak Timeline: ~~~~~~~~~ 2016-12-29 sent vulnerability report to vendor and german CERT at the BSI No reply, not even an acknowledgement of receipt 2017-01-03 german CERT contacts vendor, offering support and asking for vendors security officer No reply from vendor 2017-01-05 resent vulnerability report to vendor No reply, not even an acknowledgement of receipt 2017-01-13 report published