ID
VAR-E-201704-0410
CVE
cve_id: | CVE-2017-2149 | Trust: 0.3 |
TITLE
Multiple Toshiba memory card installers DLL Loading Remote Code Execution Vulnerability
Trust: 0.3
DESCRIPTION
Multiple Toshiba memory card installers are prone to a remote code-execution vulnerability.
A remote attacker can leverage this issue to execute arbitrary code in the context of the affected application.
The following products are vulnerable:
SDHC/SDXC Memory Card with embedded NFC functionality Software Update Tool 1.00.03 and prior versions.
SDHC Memory Card with embedded wireless LAN functionality FlashAirTM Configuration Software 3.0.2 and prior versions.
SDHC Memory Card with embedded wireless LAN functionality FlashAirTM Software Update tool (SD-WE series) 3.00.01
SDHC Memory Card with embedded wireless LAN functionality FlashAirTM Software Update tool (SD-WD/WC series) 2.00.03 and prior versions.
SDHC Memory Card with embedded wireless LAN functionality FlashAirTM Software Update tool (SD-WB/WL series) 1.00.04 and prior versions.
SDHC Memory Card with embedded TransferJetTM functionality Configuration Software 1.02 and prior versions.
SDHC Memory Card with embedded TransferJetTM functionality Software Update tool 1.00.06 and prior versions.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | toshiba | model: | sdxc memory card with embedded nfc functionality software update | scope: | eq | version: | 1.0.3 | Trust: 0.3 |
vendor: | toshiba | model: | sdxc memory card with embedded nfc functionality software update | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | toshiba | model: | sdhc memory card flashairtm software update tool | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | toshiba | model: | sdhc memory card flashairtm software update tool | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | toshiba | model: | sdhc memory card flashairtm configuration software | scope: | eq | version: | 3.0.2 | Trust: 0.3 |
vendor: | toshiba | model: | sdhc memory card flashairtm configuration software | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | toshiba | model: | sdhc memory card | scope: | eq | version: | 1.0.3 | Trust: 0.3 |
vendor: | toshiba | model: | sdhc memory card | scope: | eq | version: | 0 | Trust: 0.3 |
EXPLOIT
Attackers must trick a user into opening a file on a remote WebDAV or SMB share to exploit this issue.
A general exploit technique has been documented by TheLeader and H.D. Moore for the Metasploit Project; please see the references for more information.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Design Error
Trust: 0.3
CREDITS
Yuji Tounai of NTT Communications Corporation.
Trust: 0.3
EXTERNAL IDS
db: | JVN | id: | JVN05340816 | Trust: 0.3 |
db: | NVD | id: | CVE-2017-2149 | Trust: 0.3 |
db: | BID | id: | 97697 | Trust: 0.3 |
REFERENCES
url: | http://blog.metasploit.com/2010/08/exploiting-dll-hijacking-flaws.html | Trust: 0.3 |
url: | http://jvn.jp/en/jp/jvn05340816/index.html | Trust: 0.3 |
url: | http://blogs.technet.com/b/srd/archive/2010/08/23/more-information-about-dll-preloading-remote-attack-vector.aspx | Trust: 0.3 |
SOURCES
db: | BID | id: | 97697 |
LAST UPDATE DATE
2022-07-27T09:56:17.763000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 97697 | date: | 2017-04-18T00:07:00 |
SOURCES RELEASE DATE
db: | BID | id: | 97697 | date: | 2017-04-14T00:00:00 |