CAPEC-641: DLL Side-Loading

Detailed Stable 严重程度: High 攻击可能性: Low

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary places a malicious version of a Dynamic-Link Library (DLL) in the Windows Side-by-Side (WinSxS) directory to trick the operating system into loading this malicious DLL instead of a legitimate DLL. Programs specify the location of the DLLs to load via the use of WinSxS manifests or DLL redirection and if they aren't used then Windows searches in a predefined set of directories to locate the file. If the applications improperly specify a required DLL or WinSxS manifests aren't explicit about the characteristics of the DLL to be loaded, they can be vulnerable to side-loading.

前提条件

  • The target must fail to verify the integrity of the DLL before using them.

所需技能

High Trick the operating system in loading a malicious DLL instead of a legitimate DLL.

后果影响

影响范围: Integrity

技术影响: Execute Unauthorized Commands

缓解措施

Prevent unknown DLLs from loading through using an allowlist policy.

Patch installed applications as soon as new updates become available.

Properly restrict the location of the software being used.

Use of sxstrace.exe on Windows as well as manual inspection of the manifests.

Require code signing and avoid using relative paths for resources.

分类映射

分类名称 条目ID 条目名称
ATTACK 1574.002 Hijack Execution Flow:DLL Side-Loading
关键信息

CAPEC ID: CAPEC-641

抽象级别: Detailed

状态: Stable

典型严重程度: High

攻击可能性: Low

相关攻击模式
相关CWE弱点