Published:2017/03/01  Last Updated:2017/03/01

JVN#88713190
PrimeDrive Desktop Application Installer may insecurely load Dynamic Link Libraries

Overview

PrimeDrive Desktop Application Installer may insecurely load Dynamic Link Libraries.

Products Affected

  • PrimeDrive Desktop Application version 1.4.3 and earlier

Description

PrimeDrive Desktop Application is the client application for PrimeDrive online storage service provided by SoftBank Corp. The installer of PrimeDrive Desktop Application is vulnerable to load specific Dynamic Link Libraries in the same directory (CWE-427) .

Impact

Arbitrary code may be executed with the privilege of the user invoking the installer.

Solution

Use the Latest Installer
Use the latest installer according to the information provided by the developer.
According to the SoftBank Corp., users who have already installed PrimeDrive Desktop Application and use it do not need to re-install the application, because this vulnerability can be exploited only when installing the software and the application itself is not affected by this vulnerability.

Vendor Status

Vendor Status Last Update Vendor Notes
SoftBank Corp. Vulnerable 2017/03/01 SoftBank Corp. website

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score: 7.8
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:N/AC:M/Au:N/C:P/I:P/A:P
Base Score: 6.8
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Credit

Eiji James Yoshida of Security Professionals Network Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2017-2108
JVN iPedia JVNDB-2017-000033