ID

VAR-201711-0313


CVE

CVE-2017-12312


TITLE

Cisco Immunet Antimalware Installer input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-010476

DESCRIPTION

An untrusted search path (aka DLL Preloading) vulnerability in the Cisco Immunet antimalware installer could allow an authenticated, local attacker to execute arbitrary code via DLL hijacking if a local user with administrative privileges executes the installer in the current working directory where a crafted DLL has been placed by an attacker. The vulnerability is due to incomplete input validation of path and file names of a DLL file before it is loaded. An attacker could exploit this vulnerability by creating a malicious DLL file and installing it in a specific system directory. A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to the SYSTEM account. An attacker would need valid user credentials to exploit this vulnerability. Cisco Bug IDs: CSCvf23928. Vendors have confirmed this vulnerability Bug ID CSCvf23928 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco Immunet Antimalware is prone to a local privilege-escalation vulnerability. Local attackers may exploit this issue to execute arbitrary code with administrative privileges. installer is one of the installers

Trust: 1.98

sources: NVD: CVE-2017-12312 // JVNDB: JVNDB-2017-010476 // BID: 101930 // VULHUB: VHN-102822

AFFECTED PRODUCTS

vendor:ciscomodel:advanced malware protection for endpointsscope:eqversion:3.1.0

Trust: 1.6

vendor:ciscomodel:amp for endpointsscope: - version: -

Trust: 0.8

vendor:ciscomodel:immunet antimalwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:amp for endpointsscope:eqversion:3.1

Trust: 0.3

sources: BID: 101930 // JVNDB: JVNDB-2017-010476 // CNNVD: CNNVD-201711-670 // NVD: CVE-2017-12312

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-12312
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-12312
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201711-670
value: MEDIUM

Trust: 0.6

VULHUB: VHN-102822
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-12312
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-102822
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-12312
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-102822 // JVNDB: JVNDB-2017-010476 // CNNVD: CNNVD-201711-670 // NVD: CVE-2017-12312

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

problemtype:CWE-426

Trust: 1.9

sources: VULHUB: VHN-102822 // JVNDB: JVNDB-2017-010476 // NVD: CVE-2017-12312

THREAT TYPE

local

Trust: 0.9

sources: BID: 101930 // CNNVD: CNNVD-201711-670

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201711-670

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-010476

PATCH

title:cisco-sa-20171115-iamiurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-iami

Trust: 0.8

sources: JVNDB: JVNDB-2017-010476

EXTERNAL IDS

db:NVDid:CVE-2017-12312

Trust: 2.8

db:BIDid:101930

Trust: 2.0

db:JVNDBid:JVNDB-2017-010476

Trust: 0.8

db:CNNVDid:CNNVD-201711-670

Trust: 0.7

db:VULHUBid:VHN-102822

Trust: 0.1

sources: VULHUB: VHN-102822 // BID: 101930 // JVNDB: JVNDB-2017-010476 // CNNVD: CNNVD-201711-670 // NVD: CVE-2017-12312

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20171115-iami

Trust: 2.0

url:http://www.securityfocus.com/bid/101930

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12312

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-12312

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-102822 // BID: 101930 // JVNDB: JVNDB-2017-010476 // CNNVD: CNNVD-201711-670 // NVD: CVE-2017-12312

CREDITS

Kushal Arvind Shah of Fortinet's FortiGuard Labs.

Trust: 0.3

sources: BID: 101930

SOURCES

db:VULHUBid:VHN-102822
db:BIDid:101930
db:JVNDBid:JVNDB-2017-010476
db:CNNVDid:CNNVD-201711-670
db:NVDid:CVE-2017-12312

LAST UPDATE DATE

2024-11-23T22:45:34.105000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-102822date:2019-10-09T00:00:00
db:BIDid:101930date:2017-12-19T22:00:00
db:JVNDBid:JVNDB-2017-010476date:2017-12-15T00:00:00
db:CNNVDid:CNNVD-201711-670date:2019-10-17T00:00:00
db:NVDid:CVE-2017-12312date:2024-11-21T03:09:17.357

SOURCES RELEASE DATE

db:VULHUBid:VHN-102822date:2017-11-16T00:00:00
db:BIDid:101930date:2017-11-15T00:00:00
db:JVNDBid:JVNDB-2017-010476date:2017-12-15T00:00:00
db:CNNVDid:CNNVD-201711-670date:2017-11-20T00:00:00
db:NVDid:CVE-2017-12312date:2017-11-16T07:29:00.633