Binary planting is a broad term describing an attack in which the attacker uploads (or plants) a binary file containing malicious code to a local or remote file system, allowing a susceptible program to load and execute it.
This attack can happen in a variety of ways:
- Because of insecure access rights on a local directory, a local attacker can plant the malicious malware at a trusted place. (A common example is an application installer that does not correctly configure rights on folders where program files are stored.)
- One program may be used to plant a malicious binary in the trusted location of another application. (For instance, consider the Internet Explorer – Safari blended threat vulnerability.)
- The application looks for a binary in untrustworthy sites, such as remote file systems. (A common example is a Windows application loading a dynamic link library from the current working directory after it has been configured to use a network shared folder.)
ZOFixer.com security scan helps to find this vulnerability in your software and server, you can easily use it by registering on our website and activating the 30-day trial.