Fortinet Discovers Yandex Direct Commander DLL Preloading Vulnerability
Fortinet's FortiGuard Labs has discovered a DLL preloading vulnerability in Yandex Direct Commander.
Yandex Direct Commander is a professional ad management program in Yandex.Direct that users can use without accessing the web interface. Direct Commander allows users to easily find one ad among hundreds or one keyword among thousands, even if they relate to different campaigns. It allows users to make changes quickly using mass editing tools: copy and move campaigns, groups, ads, and keywords; delete keyword overlaps and duplicates; deftly manage bids, etc. and also create campaigns just by uploading ads and keywords from files in any format.
Yandex Direct Commander for Windows is susceptible to a DLL preloading vulnerability. The issue occurs when the application looks to load a DLL for execution and an attacker provides a malicious DLL to use instead. The application generally follows a specific search path to locate the DLL. The vulnerability can be exploited by a simple file write (or potentially an over-write) which results in a foreign DLL running under the context of the application.
Users should apply the solution provided by Yandex.
Fortinet reported the vulnerability to Yandex on June 30, 2017.
Yandex confirmed the vulnerability on July 4, 2017.
Yandex patched the vulnerability on July 4, 2017.
This vulnerability was discovered by Kushal Arvind Shah of Fortinet's FortiGuard Labs.