Published:2017/05/12  Last Updated:2017/05/12

JVN#16248227
PrimeDrive Desktop Application Installer may insecurely load executable files

Overview

PrimeDrive Desktop Application Installer may insecurely load executable files.

Products Affected

  • PrimeDrive Desktop Application version 1.4.4 and earlier

Description

PrimeDrive Desktop Application is the client application for PrimeDrive online storage service provided by SoftBank Corp. The installer of PrimeDrive Desktop Application contains an issue with the file search path, which may insecurely load executable files (CWE-427).

Impact

Arbitrary code may be executed with the privilege of the user invoking the installer.

Solution

Use the Latest Installer
Use the latest installer according to the information provided by the developer.
According to the SoftBank Corp., users who have already installed PrimeDrive Desktop Application and use it do not need to re-install the application, because this vulnerability can only be exploited when installing the software and the application itself is not affected by this vulnerability.

Vendor Status

Vendor Status Last Update Vendor Notes
SoftBank Corp. Vulnerable 2017/05/12 SoftBank Corp. website

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score: 7.8
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:N/AC:M/Au:N/C:P/I:P/A:P
Base Score: 6.8
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Credit

Eili Masami of Tachibana Lab. and Eiji James Yoshida of Security Professionals Network Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2017-2167
JVN iPedia JVNDB-2017-000080

Update History

2017/05/12
Information under the section "Products Affected" was updated.