JVN#15205734
DX Library vulnerable to remote code execution
Overview
DX Library contains a remote code execution vulnerability.
Products Affected
- DX Library for VisualC++ Ver3.13f to Ver3.16b
- DX Library for BorlandC++ Ver3.13f to Ver3.16b
- DX Library for Gnu C++ Ver3.13f to Ver3.16b
Description
DX Library is an open source library for creating Windows applications. DX Library contains a remote code execution vulnerability due to an issue in printfDx()
.
Impact
When processing a specially crafted string, an application built using DX Library may allow arbitrary code to be executed.
Solution
Update DX Library and rebuild the application
Update to the latest version of DX Library and rebuild the application.
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
Takumi Yamada | Vulnerable | 2016/06/08 | Takumi Yamada website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Comment
This analysis assumes an attack to an application that uses network functions.
Note that an application without network functions may also be affected if the user is tricked into processing a malicious data.
Credit
Tomoya Kitagawa of Graduate School of Information Science, Nara Institute of Science and Technology reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2016-4819 |
JVN iPedia |
JVNDB-2016-000099 |