[Japanese]

JVNDB-2016-000206

Installer of Evernote for Windows may insecurely load Dynamic Link Libraries

Overview

The installer of Evernote for Windows contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries.

Takashi Yoshikawa of Mitsui Bussan Secure Directions reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

Base Metrics: 6.8 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial

CVSS V3 Severity:
Base Metrics: 7.8 (High) [IPA Score]
  • Access Vector: Local
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
Affected Products


Evernote Corporation
  • Evernote for Windows versions prior to 6.3

Impact

Arbitrary code may be executed with the privilege of the user invoking the installer.
Solution

[Use the Latest Installer]
Use the latest installer according to the information provided by the developer.
The developer states that this vulnerability has been addressed in Evernote for Windows 6.3.
Vendor Information

Evernote Corporation
CWE (What is CWE?)

  1. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2016-4900
References

  1. JVN : JVN#03251132
  2. National Vulnerability Database (NVD) : CVE-2016-4900
Revision History

[2016/10/19]
  Web page was published
[2017/11/27]
  References : Content was added