[Japanese]

JVNDB-2013-002240

Arbitrary program execution vulnerability in TrendLink ActiveX control

Overview

TrendLink provided by Canary Labs is a tool to help visualize data for analysis. The SaveToFile method provided in the ActiveX control in TrendLink contains a vulnerability where file creation is not properly restricted.

Security Research and Service Institute - Information and Communication Security Technology Center (ICST), Taiwan R.O.C Kuang-Chun Hung reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

Base Metrics: 8.5 (High) [NVD Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: Single Instance
  • Confidentiality Impact: Complete
  • Integrity Impact: Complete
  • Availability Impact: Complete

Affected Products


Canary Labs
  • TrendLink versions 9.0.2.27051 and earlier

Impact

A remote attacker may create an arbitrary file on the system and as a result, arbitrary code may be executed.
Solution

[Update the software]
Update to the latest version according to the information provided by the developer.
Vendor Information

Canary Labs
CWE (What is CWE?)

  1. Permissions(CWE-264) [NVD Evaluation]
CVE (What is CVE?)

  1. CVE-2012-3022
References

  1. JVN : JVN#30281958
  2. National Vulnerability Database (NVD) : CVE-2012-3022
  3. ICS-CERT ADVISORY : ICSA-13-098-01
Revision History

[2014/07/25]
  Web page was published