CVE-2018-6318

In Sophos Tester Tool 3.2.0.7 Beta, the driver loads (in the context of the application used to test an exploit or ransomware) the DLL using a payload that runs from NTDLL.DLL (so, it's run in userland), but the driver doesn't perform any validation of this DLL (not its signature, not its hash, etc.). A person can change this DLL in a local way, or with a remote connection, to a malicious DLL with the same name -- and when the product is used, this malicious DLL will be loaded, aka a DLL Hijacking attack.
References
Link Resource
https://29wspy.ru/exploits/CVE-2018-6318.pdf Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:sophos:sophos_tester:3.2.0.7:beta:*:*:*:*:*:*

Information

Published : 2018-02-02 13:29

Updated : 2018-02-15 07:41


NVD link : CVE-2018-6318

Mitre link : CVE-2018-6318


JSON object : View

CWE
CWE-426

Untrusted Search Path

Advertisement

dedicated server usa

Products Affected

sophos

  • sophos_tester