A vulnerability in the encryption and permission implementation of Malwarebytes Anti-Malware consumer version 2.2.1 and prior (fixed in 3.0.4) allows an attacker to take control of the whitelisting feature (exclusions.dat under %SYSTEMDRIVE%\ProgramData) to permit execution of unauthorized applications including malware and malicious websites. Files blacklisted by Malwarebytes Malware Protect can be executed, and domains blacklisted by Malwarebytes Web Protect can be reached through HTTP.
Software security is not security software. Here we're concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Link | Tags |
---|---|
https://www.youtube.com/watch?v=LF5ic5nOoUY | third party advisory |
http://www.securitytube.net/video/16690 | third party advisory |
https://github.com/mspaling/mbam-exclusions-poc-/blob/master/mbam-whitelist-poc.txt | third party advisory exploit |
https://github.com/mspaling/mbam-exclusions-poc- | third party advisory exploit |
https://forums.malwarebytes.com/topic/158251-malwarebytes-hall-of-fame/ | vendor advisory |