Fortinet Discovers AirVPN for Windows DLL PreLoading Vulnerability
Fortinet's FortiGuard Labs has discovered a DLL preloading vulnerability in AirVPN for Windows.
AirVPN for Windows is a Virtual Private Network product to protect a user's identity and personal privacy using their anonymous VPN, proxy & email encryption services. It allows users to anonymize all their online activities.
AirVPN for Windows is susceptible to a DLL preloading vulnerability. The issue occurs when the application looks to load a DLL for execution and an attacker provides a malicious DLL to use instead. The application generally follows a specific search path to locate the DLL. The vulnerability can be exploited by a simple file write (or potentially an over-write) which results in a foreign DLL running under the context of the application.
Users should apply the solution provided by AirVPN.
Fortinet reported the vulnerability to AirVPN on May 14, 2018
AirVPN confirmed the vulnerability on May 31, 2018.
AirVPN patched the vulnerability on July 21, 2018.
This vulnerability was discovered by Kushal Arvind Shah of Fortinet's FortiGuard Labs.