U.S. Flag Official website of the Department of Homeland Security
U.S. Department of Homeland Security Seal. ICS-CERT. Industrial Control Systems Cyber Emergency Response Team.
TLP:WHITE

Alert (ICS-ALERT-10-239-01)

Microsoft Applications Dynamic Library Loading Vulnerability

Original release date: August 10, 2010 | Last revised: November 09, 2018

Legal Notice

All information products included in http://ics-cert.us-cert.gov are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.



Summary

ICS-CERT is aware of reports describing a method to load attacker-supplied DLLs in vulnerable Microsoft Windows applications. A number of potential mitigations, including the ability to limit the application DLL search path, have been provided in Microsoft Security Advisory 2269637. Additional details and references have been provided in US-CERT Technical Alert TA10-238A and VU Note #707943.

Of note to industrial control systems environments is the fact that DLL safe search mode is disabled by default in Windows 2000 Service Pack 4 and Windows XP prior to Service Pack 3. Windows 2000 versions prior to Service Pack 4 do not support DLL safe search mode. While this feature does not prevent the exact same types of attacks, it does provide mitigation on a local system by forcing a specific order of DLL loading. Without DLL safe search mode enabled, the current directory is searched before any system level directories. This provides an attacker with the opportunity to drop a malicious DLL with the same name as a system DLL in the current directory and have it be executed prior to the valid DLL file. Microsoft has published an article outlining details about DLL search order on Microsoft Windows systems.

Environments which have implemented defense in depth measures like outbound firewall filtering and limiting or eliminating web and E-mail access are well postured to defend against these risks. Owner/operators with those mitigations in place should continue to focus on alternate weak points like the introduction of malicious code through USB drives as seen with Stuxnet.

ICS-CERT recommends industrial control systems vendors review their software to determine if any of their applications are vulnerable. Microsoft has published an article describing how to properly implement DLL security in Windows-based applications.

Please report any issues affecting control systems in critical infrastructure environments to ICS-CERT.


Contact Information

For any questions related to this report, please contact the NCCIC at:

Email: NCCICCUSTOMERSERVICE@hq.dhs.gov
Toll Free: 1-888-282-0870

For industrial control systems cybersecurity information:  http://ics-cert.us-cert.gov 
or incident reporting:  https://ics-cert.us-cert.gov/Report-Incident?

The NCCIC continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.

Was this document helpful?  Yes  |  Somewhat  |  No

Back to Top