Community
Participate
Working Groups
+++ This bug was initially created as a clone of Bug #325294 +++ An Eclipse-based application can be hijacked during launch by placing a DLL file in the working directory when the application is launched. If the DLL matches the filename of the eclipse companion shared library, it will be invoked instead of the real DLL. This is particularly damaging for applications that associate file types with the executable. For details see: http://securityreason.com/wlb_show/WLB-2010090065
Created attachment 179342 [details] patch against 34x branch
Created attachment 179343 [details] build script changes for compiling on win32
Created attachment 179346 [details] patch against 34x branch (w/o whitespace changes)
I have reproduced all three of the shared library, vm and library.jar attacks on linux.gtk.x86 and have confirmed that this patch fixes them.
Binaries are recompiled and released. Tagged as R34x_20100922
(In reply to comment #5) > Binaries are recompiled and released. Tagged as R34x_20100922 The map file indicates R34x_v20100922 tag was used (with a 'v').
Yes, sorry, the tag contains a 'v', this was just a typo in the comment here.
Removing security advisories group. The fix is available in 3.6.2, and the exploit is already public anyway (see comment #0).