In Sophos Tester Tool 3.2.0.7 Beta, the driver loads (in the context of the application used to test an exploit or ransomware) the DLL using a payload that runs from NTDLL.DLL (so, it's run in userland), but the driver doesn't perform any validation of this DLL (not its signature, not its hash, etc.). A person can change this DLL in a local way, or with a remote connection, to a malicious DLL with the same name -- and when the product is used, this malicious DLL will be loaded, aka a DLL Hijacking attack.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://29wspy.ru/exploits/CVE-2018-6318.pdf |
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2018-02-02T21:00:00
Updated: 2024-08-05T06:01:48.911Z
Reserved: 2018-01-26T00:00:00
Link: CVE-2018-6318
Vulnrichment
No data.
NVD
Status : Modified
Published: 2018-02-02T21:29:00.917
Modified: 2024-11-21T04:10:28.523
Link: CVE-2018-6318
Redhat
No data.