Published:2017/02/17  Last Updated:2017/02/24

JVN#86200862
Self-Extracting Archives created by 7-ZIP32.DLL may insecurely load Dynamic Link Libraries

Overview

Self-extracting archive files created by 7-ZIP32.DLL may insecurely load Dynamic Link Libraries.

Products Affected

  • Self-extracting archive files created by 7-ZIP32.DLL ver9.22.00.01 and earlier

Description

7-ZIP32.DLL is an open source library for compressing and decompressing 7z and zip format files. It can also create self-extracting archive files.
Self-extracting archive files created by 7-ZIP32.DLL contain an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).

Impact

Arbitrary code may be executed with the privilege of the user invoking a vulnerable self-extracting archive file.

Solution

Use the Latest Library to Recreate Self-Extracting Archive files
Use the latest version according to the information provided by the developer, and recreate self-extracting archive files.

Vendor Status

Vendor Status Last Update Vendor Notes
Akky Vulnerable 2017/02/23 Akky website

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score: 7.8
CVSS v2 AV:N/AC:M/Au:N/C:P/I:P/A:P
Base Score: 6.8

Comment

This analysis assumes that the user is tricked into placing a malicious DLL file in the same directory as a vulnerable self-extracting archive file.

Credit

Eili Masami of Tachibana Lab. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2017-2107
JVN iPedia JVNDB-2017-000024

Update History

2017/02/20
Akky update status
2017/02/24
Akky update status