Published:2017/06/07  Last Updated:2017/06/07

JVN#99737748
AppCheck may insecurely invoke an executable file

Overview

AppCheck and its installer may insecurely invoke an executable file.

Products Affected

  • AppCheck prior to Version 2.0.1.15
  • AppCheck Pro prior to Version 2.0.1.15

Description

AppCheck provided by JIRANSOFT JAPAN, INC. is an anti-ransomware software. AppCheck and its installer contains an issue with the search path for executable files, which may lead to insecurely invoke an executable file (CWE-427).

Impact

Arbitrary code may be executed with the privilege of the user running the AppCheck or the installer.

Solution

Use the latest installer
For installation or re-installation, use the latest installer according to the information provided by the developer.

Apply the Patch
According to the developer, the appropriate patch is applied automatically.
The version will become 2.0.1.15 or later after the patch is applied. The version number is displayed at the right lower corner of the startup screen.

Vendor Status

Vendor Status Last Update Vendor Notes
JIRANSOFT JAPAN, INC. Vulnerable 2017/06/07 JIRANSOFT JAPAN, INC. website

References

  1. Japan Vulnerability Note JVNTA#91240916
    Insecure DLL Loading and Command Execution Issues on Many Windows Application Programs

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score: 7.8
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:N/AC:M/Au:N/C:P/I:P/A:P
Base Score: 6.8
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Comment

This analysis assumes that the user is tricked into placing a malicious executable file prepared by an attacker in a specific folder.

Credit

Takashi Yoshikawa of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2017-2214
JVN iPedia JVNDB-2017-000125