Pré-requisitos
The target must fail to verify the integrity of the DLL before using them.
Habilidades Necessárias
Trick the operating system in loading a malicious DLL instead of a legitimate DLL.
Mitigações
Prevent unknown DLLs from loading through using an allowlist policy.
Patch installed applications as soon as new updates become available.
Properly restrict the location of the software being used.
Use of sxstrace.exe on Windows as well as manual inspection of the manifests.
Require code signing and avoid using relative paths for resources.
Fraquezas Relacionadas
| CWE-ID |
Nome da Fraqueza |
|
Use of Incorrectly-Resolved Name or Reference The product uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere. |
Referências
REF-501
DLL SIDE-LOADING: A Thorn in the Side of the Anti-Virus Industry
Stewart A..
https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-dll-sideloading.pdf
Submissão
| Nome |
Organização |
Data |
Data de lançamento |
| CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
|
Modificações
| Nome |
Organização |
Data |
Comentário |
| CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Taxonomy_Mappings |
| CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated Mitigations, Taxonomy_Mappings |