[Japanese]

JVNDB-2018-000009

The installer of Anshin net security for Windows may insecurely load Dynamic Link Libraries

Overview

Anshin net security for Windows provided by KDDI CORPORATION is an Internet Security suite. The installer of Anshin net security for Windows contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).

Eili Masami of Tachibana Lab. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 7.8 (High) [IPA Score]
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
CVSS V2 Severity:
Base Metrics 6.8 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial
Affected Products


KDDI
  • Anshin net security for Windows Version 16.0.1.44 and earlier

Impact

Arbitrary code may be executed with the privilege of the user invoking the installer.
Solution

[Use the latest installer]
Use the latest installer according to the information provided by the developer.
Also when executing the installer, be sure to check there are no suspicious files in the directory where the installer resides.
Note that this vulnerability affects the installer only, thus users who have already installed Anshin net security for Windows do not need to re-install the software using the latest installer.
Vendor Information

KDDI
CWE (What is CWE?)

  1. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2018-0517
References

  1. JVN : JVN#70615027
  2. JVN : JVNTA#91240916
  3. National Vulnerability Database (NVD) : CVE-2018-0517
Revision History

  • [2018/02/06]
      Web page was published
  • [2018/04/11]
      References : Content was added