JVN#49476817
DX Library vulnerable to buffer overflow
Overview
DX Library contains a buffer overflow vulnerability.
Products Affected
- DX Library for VisualC++ Ver3.15e and earlier
- DX Library for BorlandC++ Ver3.15e and earlier
- DX Library for Gnu C++ Ver3.15e and earlier
- DX Library for VisualC# Ver3.15e and earlier
Description
DX Library is an open source library for creating Windows application. DX Library contains a buffer overflow vulnerability due to a flaw in processing an inner function CL_vsprintf().
Impact
When processing a specially crafted string, an application built using DX Library may allow an arbitrary code to be executed with the privilege of the user running the application.
Solution
Update DX Library and rebuild the application
Update to the latest version of DX Library and rebuild the application.
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
Takumi Yamada | Vulnerable | 2016/05/29 | Takumi Yamada website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Comment
This analysis assumes an attack to an application that uses network functions.
Note that an application without network function may also be affected if the user is tricked into processing a malicious data.
Credit
Tomoya Kitagawa reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2016-1131 |
JVN iPedia |
JVNDB-2016-000001 |
Update History
- 2016/05/29
- Takumi Yamada update status