mirror of
https://github.com/SoftEtherVPN/SoftEtherVPN.git
synced 2025-07-07 08:14:58 +03:00
Preventing the Win32 API LoadLibrary() current directory DLL injection issue.
When loading the DLL file by the LoadLibrary() function in Windows VPN programs, we changed the behavior not to search the current directory. Based on this improvement, even if there are untrusted DLL files in the calendar directory, it is now safe to avoid the problem of unexpected security problem caused by the default loading behavior of Windows. Acknowledgments: This is based on a report by Herman Groeneveld, aka Sh4d0wman.
This commit is contained in:
@ -133,6 +133,8 @@
|
||||
|
||||
#endif // VPN_SPEED
|
||||
|
||||
void InitProcessCallOnce();
|
||||
|
||||
#ifdef VPN_EXE
|
||||
// To build the executable file
|
||||
#ifdef WIN32
|
||||
@ -142,6 +144,7 @@ int main(int argc, char *argv[]);
|
||||
int PASCAL WinMain(HINSTANCE hInst, HINSTANCE hPrev, char *CmdLine, int CmdShow)
|
||||
{
|
||||
char *argv[] = { CmdLine, };
|
||||
InitProcessCallOnce();
|
||||
return main(1, argv);
|
||||
}
|
||||
#endif // WIN32
|
||||
|
Reference in New Issue
Block a user