[Japanese]

JVNDB-2017-000210

Installer of "Security Kinou Mihariban" may insecurely load Dynamic Link Libraries

Overview

Installer of "Security Kinou Mihariban" provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).

Eili Masami of Tachibana Lab. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

Base Metrics: 6.8 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial

CVSS V3 Severity:
Base Metrics: 7.8 (High) [IPA Score]
  • Access Vector: Local
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
Affected Products


NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION
  • Security Kinou Mihariban v1.0.21 and earlier

Impact

Arbitrary code may be executed with the privilege of the user invoking the installer.
Solution

[Use the latest installer]
Use the latest installer ("Security Kinou Mihariban" v1.0.22 or upper version) according to the information provided by the developer.

When installing "Security Kinou Mihariban", be sure to check there are no suspicious files in the directory where the installer resides.

Note that this vulnerability affects the installer only, thus users who have already installed "Security Kinou Mihariban" do not need to re-install the software using the latest installer.
Vendor Information

NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION
CWE (What is CWE?)

  1. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2017-10826
References

  1. JVN : JVN#11601216
  2. JVN : JVNTA#91240916
Revision History

[2017/08/25]
  Web page was published