X-Recipient: archive-cygwin AT delorie DOT com DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org E1E6B385829A DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cygwin.com; s=default; t=1706865948; bh=yzScaplOj37p0nBH0TSk9RyFdfHiiIpetJmGKAgXUyQ=; h=Date:Subject:To:List-Id:List-Unsubscribe:List-Archive:List-Post: List-Help:List-Subscribe:From:Reply-To:From; b=IqIsTXSgvVqi8+vEo4jHyfoRseWphK4n0rGHVWBoFDD2hfoJAN778vU50jBgfSvI4 eGpc4h/qo1WETbMnt6MQGEGf8Lumm5/jYozmvNYE9jvRCGtpkWT42p2tgWQ7sFfOe/ 0idnyTJJIKifXbVl7Vn/M83HbmTO01BD2fgWEdEg= X-Original-To: cygwin AT cygwin DOT com Delivered-To: cygwin AT cygwin DOT com DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org D24203858C2C ARC-Filter: OpenARC Filter v1.0.0 sourceware.org D24203858C2C ARC-Seal: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1706865912; cv=none; b=vqSK4I/Fc+HuiS1rPMEErv/iiaRrJRgQQA1NhjGgUbFQeM2zYxSHi2voLruGP5uQVFBbD4eEki1vw0C3zF2ONskYfIIZyxAXuqUb7BwVAN8rC1FiNTUeghxaurMpbcnxqmVNCuhofnPjIbzorCAYPu/f4X/HQO80Uxo7nMigrTc= ARC-Message-Signature: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1706865912; c=relaxed/simple; bh=hQiZoDL2bBdLaTWstGCyVR1KhvGWWn3sQkyV27G9eq8=; h=DKIM-Signature:MIME-Version:From:Date:Message-ID:Subject:To; b=FFoy6X9egJEPy1TMJ/MEmo64FPNWtQ9aMW30xacUuUHdWduC2UDNntEwW9SFtoYXbVw6oTQVhdpPvrwQV32YQlO2Yx7+0SfiaiouZymmvUTghqQoETZOQcHdXIAOo+j50Bg0qMx3+/+4xve+xiT02aPrWgIH1lohOfo3IpNb1WM= ARC-Authentication-Results: i=1; server2.sourceware.org X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706865909; x=1707470709; h=to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=hQiZoDL2bBdLaTWstGCyVR1KhvGWWn3sQkyV27G9eq8=; b=Uvdw7M7nAfxQ6EWqU9N9Sjry5UHNQ/mMd33FDte8QvwBJIgETIouC5vatJ31AhDIvE 191hJJa5bcMKuoHcfuSgr6/99aQ0XgAArlCzN97e9+2mqhsILCMSdVVSR65Q2i4+YQRo uKrUnG6WG67fRE6OI3Mtkov21RSm939wVeKz8t+gqXc6+LPyLuLlNnw4gvWRWF3/dbdd E/NT47wfFA5AKnDKMfegXRPImYOvR6Y0hKFLltAi7JbEi572BZ3I2y9W0pqVH6HxSDuX VkDIAiDI//PRr2AtcPqsaE4V2v9Htt9LcsDfrgQ/DR7fllHkdacqP70r8fulL5+9X9aR wj+g== X-Gm-Message-State: AOJu0YzmR18RdMlNQQQn4TGm1A9PKtNZ7jAswUaavL7jPy7v3lrshc/k /BB1B60feZaONipJnMgZAy7fIpIQWHyzlEbdme0awxVW8+Cdo8iXM4PA8a1tHZlBCeFxxPxHCVo zoGqySYwKo1V+R+ocWwHjuqTLuO3w0WOhGw== X-Google-Smtp-Source: AGHT+IE3UyBwRgtpt2p5H9EoX+0OpxrDocLochjZEBQ41I5g+J9IQjdqV/3s9iVNUkbvClcsgfN3X5vQsCTA5V8QzEU= X-Received: by 2002:a81:b607:0:b0:602:cf62:6593 with SMTP id u7-20020a81b607000000b00602cf626593mr1801161ywh.12.1706865908616; Fri, 02 Feb 2024 01:25:08 -0800 (PST) MIME-Version: 1.0 Date: Fri, 2 Feb 2024 14:54:57 +0530 Message-ID: Subject: VULNERABILITY REPORT: DLL Hijacking Vulnerability in CygWin setup-x86_64.exe To: cygwin AT cygwin DOT com X-Spam-Status: No, score=3.8 required=5.0 tests=BAYES_50, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FREEMAIL_ENVFROM_END_DIGIT, FREEMAIL_FROM, HTML_MESSAGE, HTML_OBFUSCATE_05_10, KAM_EXEURI, RCVD_IN_DNSWL_NONE, SPF_HELO_NONE, SPF_PASS, TXREP, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Level: *** X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-Content-Filtered-By: Mailman/MimeDel 2.1.30 X-BeenThere: cygwin AT cygwin DOT com X-Mailman-Version: 2.1.30 List-Id: General Cygwin discussions and problem reports List-Archive: List-Post: List-Help: List-Subscribe: , From: Suman Chakraborty via Cygwin Reply-To: Suman Chakraborty Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "Cygwin" Hey Cygwin Team, I hope this email finds you well. As an independent security researcher, I often explore open-source projects to identify and report potential security vulnerabilities. During my recent exploration of Cygwin, I came across a critical vulnerability in setup-x86_64.exe that I believe warrants your immediate attention. 1. Executive Summary: The vulnerability pertains to not finding the profapi.dll and insecure loading of dynamic link libraries (DLLs), specifically profapi.dll. If exploited, this vulnerability could allow an attacker to execute arbitrary code on a victim's machine, potentially leading to data breaches, system compromise, and other malicious activities. 2. Details of the Vulnerability: Type: DLL Hijacking Affected Component: profapi.dll Impact: Remote Code Execution, Data Theft or Manipulation, Persistence, Bypassing Security Mechanisms, Spreading Malware. Description: The application attempts to load profapi.dll from its current working directory (CWD). If a malicious version of test.dll is present in the CWD, the application will inadvertently load and execute the malicious DLL. 3. Proof of Concept: I've attached a proof of concept to this email, demonstrating the vulnerability in action. Please review it to understand the potential impact and exploitability. The link is given below: POC Video: https://drive.google.com/file/d/11rBPnImiZS-CEwPM9eBlU6GSHjHYD2ns/view?usp=sharing 4. Conclusion: The identified DLL Hijacking vulnerability poses a significant risk to users of Cygwin during the installation and executing the setup-x86_64.exe . I urge you to address this issue promptly. I'm available for any further clarification or assistance in addressing the vulnerability Thank you for your attention to this matter, and I appreciate the hard work you put into maintaining and improving open-source projects for the community.Best regards, Submitted by: Suman Kumar Chakraborty LinkedIn:https://www.linkedin.com/in/suman-chakraborty-b857901b1/ -- Problem reports: https://cygwin.com/problems.html FAQ: https://cygwin.com/faq/ Documentation: https://cygwin.com/docs.html Unsubscribe info: https://cygwin.com/ml/#unsubscribe-simple