[Japanese]
|
JVNDB-2017-000221
|
Installer of FENCE-Explorer may insecurely load Dynamic Link Libraries and invoke executable files
|
FENCE-Explorer provided by FUJITSU BROAD SOLUTION & CONSULTING Inc. is a tool to view and edit a file in "FENCE Briefcase" which is created by FENCE-Pro and other FENCE series software. Installer of FENCE-Explorer contains an issue with the search path for DLL/executable files, which may lead to insecurely loading Dynamic Link Libraries and invoking executable files (CWE-427).
Eili Masami of Tachibana Lab. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 7.8 (High) [IPA Score]
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
CVSS V2 Severity: Base Metrics 6.8 (Medium) [IPA Score]
- Access Vector: Network
- Access Complexity: Medium
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: Partial
- Availability Impact: Partial
|
|
FUJITSU BROAD SOLUTION & CONSULTING INC.
- FENCE-Explorer for Windows V8.4.1 and earlier
|
|
Arbitrary code may be executed with the privilege of the user invoking the installer.
|
[Use the latest installer]
Use the latest installer according to the information provided by the developer.
Users who already have installed FENCE-Explorer do not need to re-install the application, because this issue affects the installer only.
Also note that a user who uses FENCE-Explorer with Portable Application is not affected by this vulnerability because in that case a user can specify a directory to place files before executing FENCE-Explorer. However, the executable file itself contains a DLL preloading vulnerability, therefore a user should be careful not to place a suspicious file sent by the third party in the directory.
|
FUJITSU BROAD SOLUTION & CONSULTING INC.
|
- No Mapping(CWE-Other) [IPA Evaluation]
|
- CVE-2017-10855
|
- JVN : JVN#57205588
- JVN : JVNTA#91240916
- National Vulnerability Database (NVD) : CVE-2017-10855
|
- [2017/09/11]
Web page was published
- [2018/02/28]
References : Content was added
|