[Japanese]

JVNDB-2017-000162

Installer of Douroshisetu Kihon Data Sakusei System may insecurely load Dynamic Link Libraries

Overview

The installer of Douroshisetu Kihon Data Sakusei System provided by National Institute for Land and Infrastructure Management contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).

Eili Masami of Tachibana Lab. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 7.8 (High) [IPA Score]
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
CVSS V2 Severity:
Base Metrics 6.8 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial
Affected Products


Ministry of Land, Infrastructure, Transport and Tourism
  • Douroshisetu Kihon Data Sakusei System Ver1.0.2 and earlier

Impact

Arbitrary code may be executed with the privilege of the use invoking the installer.
Solution

[Apply Workaround]
Be sure to check no malicious file exists in the same directory where the installer is placed.

According to the developer, the distributed archive file contains a directory and the installer (setup.exe) in it.
When extracting the archive file, a clean directory which contains the installer is created.
Be sure not to copy any files into this directory before executing the installer. Keep this directory clean.
Vendor Information

Ministry of Land, Infrastructure, Transport and Tourism
CWE (What is CWE?)

  1. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2017-2229
References

  1. JVN : JVNTA#91240916
  2. JVN : JVN#20409270
  3. National Vulnerability Database (NVD) : CVE-2017-2229
Revision History

  • [2017/07/04]
      Web page was published
    [2018/02/07]
      References : Content was added