In Sophos Tester Tool 3.2.0.7 Beta, the driver loads (in the context of the application used to test an exploit or ransomware) the DLL using a payload that runs from NTDLL.DLL (so, it's run in userland), but the driver doesn't perform any validation of this DLL (not its signature, not its hash, etc.). A person can change this DLL in a local way, or with a remote connection, to a malicious DLL with the same name -- and when the product is used, this malicious DLL will be loaded, aka a DLL Hijacking attack.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2018-02-02T21:00:00

Updated: 2024-08-05T06:01:48.911Z

Reserved: 2018-01-26T00:00:00

Link: CVE-2018-6318

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-02-02T21:29:00.917

Modified: 2024-11-21T04:10:28.523

Link: CVE-2018-6318

cve-icon Redhat

No data.