Insecure DLL library loading in Snort



Published: 2016-10-04 | Updated: 2022-01-24
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2016-1417
CWE-ID CWE-427
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Snort
Server applications / IDS/IPS systems, Firewalls and proxy servers

Vendor Sourcefire

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Insecure library loading

EUVDB-ID: #VU738

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-1417

CWE-ID: CWE-427 - Uncontrolled Search Path Element

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to absence of validation of search path when loading DLL files. A remote attacker can place malicious 'tcapi.dll' DLL file on the SBM or WebDav share and trick the victim to load a pcap file from that location.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Mitigation

Cybersecurity Help is not aware of any official solution to address this vulnerability.

Vulnerable software versions

Snort: 2.9.7.0

External links

http://hyp3rlinx.altervista.org/advisories/SNORT-DLL-HIJACK.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###