CVE-2017-12580

An issue was discovered in IDM UltraEdit through 24.10.0.32. To exploit the vulnerability, on unpatched Windows systems, an attacker could include in the same directory as the affected executable a DLL using the name of a Windows DLL. This DLL must be preloaded by the executable (for example, "ntmarta.dll"). When the installer EXE is executed by the user, the DLL located in the EXE's current directory will be loaded instead of the Windows DLL, allowing the attacker to run arbitrary code on the affected system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ultraedit:ultraedit:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:09

Type Values Removed Values Added
References () https://support.microsoft.com/en-us/help/2389418/secure-loading-of-libraries-to-prevent-dll-preloading-attacks - Patch, Third Party Advisory () https://support.microsoft.com/en-us/help/2389418/secure-loading-of-libraries-to-prevent-dll-preloading-attacks - Patch, Third Party Advisory
References () https://www.fortiguard.com/zeroday/FG-VD-17-089 - Third Party Advisory () https://www.fortiguard.com/zeroday/FG-VD-17-089 - Third Party Advisory

Information

Published : 2020-03-02 16:15

Updated : 2024-11-21 03:09


NVD link : CVE-2017-12580

Mitre link : CVE-2017-12580

CVE.ORG link : CVE-2017-12580


JSON object : View

Products Affected

ultraedit

  • ultraedit
CWE
CWE-426

Untrusted Search Path