{"uuid": "5d5dff66-225b-455e-ba58-884902aad4e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-1999-0376", "type": "published-proof-of-concept", "source": "https://t.me/ExcreamOnSecurity/252", "content": "Windows Process Injection: KnownDlls Cache Poisoning\n\nThis is a quick post in response to a method of injection described by James Forshaw in Bypassing CIG Through KnownDlls. The first example of poisoning the KnownDlls cache on Windows can be sourced back to a security advisory CVE-1999-0376 or MS99-066 published in February 1999. That vulnerability was discovered by Christien Rioux from the hacker group, L0pht. The PoC he released to demonstrate the attack became the basis for other projects involving DLL injection and function hooking. \n\nhttps://modexp.wordpress.com/2019/08/12/windows-process-injection-knowndlls/\nhttps://github.com/odzhan/injection\n\n#windows #exploitation #redteaming #malware", "creation_timestamp": "2019-08-30T10:11:57.000000Z"}