ID

VAR-E-201704-0410


CVE

cve_id:CVE-2017-2149

Trust: 0.3

sources: BID: 97697

TITLE

Multiple Toshiba memory card installers DLL Loading Remote Code Execution Vulnerability

Trust: 0.3

sources: BID: 97697

DESCRIPTION

Multiple Toshiba memory card installers are prone to a remote code-execution vulnerability.
A remote attacker can leverage this issue to execute arbitrary code in the context of the affected application.
The following products are vulnerable:
SDHC/SDXC Memory Card with embedded NFC functionality Software Update Tool 1.00.03 and prior versions.
SDHC Memory Card with embedded wireless LAN functionality FlashAirTM Configuration Software 3.0.2 and prior versions.
SDHC Memory Card with embedded wireless LAN functionality FlashAirTM Software Update tool (SD-WE series) 3.00.01
SDHC Memory Card with embedded wireless LAN functionality FlashAirTM Software Update tool (SD-WD/WC series) 2.00.03 and prior versions.
SDHC Memory Card with embedded wireless LAN functionality FlashAirTM Software Update tool (SD-WB/WL series) 1.00.04 and prior versions.
SDHC Memory Card with embedded TransferJetTM functionality Configuration Software 1.02 and prior versions.
SDHC Memory Card with embedded TransferJetTM functionality Software Update tool 1.00.06 and prior versions.

Trust: 0.3

sources: BID: 97697

AFFECTED PRODUCTS

vendor:toshibamodel:sdxc memory card with embedded nfc functionality software updatescope:eqversion:1.0.3

Trust: 0.3

vendor:toshibamodel:sdxc memory card with embedded nfc functionality software updatescope:eqversion:0

Trust: 0.3

vendor:toshibamodel:sdhc memory card flashairtm software update toolscope:eqversion:3.0.1

Trust: 0.3

vendor:toshibamodel:sdhc memory card flashairtm software update toolscope:eqversion:0

Trust: 0.3

vendor:toshibamodel:sdhc memory card flashairtm configuration softwarescope:eqversion:3.0.2

Trust: 0.3

vendor:toshibamodel:sdhc memory card flashairtm configuration softwarescope:eqversion:0

Trust: 0.3

vendor:toshibamodel:sdhc memory cardscope:eqversion:1.0.3

Trust: 0.3

vendor:toshibamodel:sdhc memory cardscope:eqversion:0

Trust: 0.3

sources: BID: 97697

EXPLOIT

Attackers must trick a user into opening a file on a remote WebDAV or SMB share to exploit this issue.
A general exploit technique has been documented by TheLeader and H.D. Moore for the Metasploit Project; please see the references for more information.

Trust: 0.3

sources: BID: 97697

PRICE

Free

Trust: 0.3

sources: BID: 97697

TYPE

Design Error

Trust: 0.3

sources: BID: 97697

CREDITS

Yuji Tounai of NTT Communications Corporation.

Trust: 0.3

sources: BID: 97697

EXTERNAL IDS

db:JVNid:JVN05340816

Trust: 0.3

db:NVDid:CVE-2017-2149

Trust: 0.3

db:BIDid:97697

Trust: 0.3

sources: BID: 97697

REFERENCES

url:http://blog.metasploit.com/2010/08/exploiting-dll-hijacking-flaws.html

Trust: 0.3

url:http://jvn.jp/en/jp/jvn05340816/index.html

Trust: 0.3

url:http://blogs.technet.com/b/srd/archive/2010/08/23/more-information-about-dll-preloading-remote-attack-vector.aspx

Trust: 0.3

sources: BID: 97697

SOURCES

db:BIDid:97697

LAST UPDATE DATE

2022-07-27T09:56:17.763000+00:00


SOURCES UPDATE DATE

db:BIDid:97697date:2017-04-18T00:07:00

SOURCES RELEASE DATE

db:BIDid:97697date:2017-04-14T00:00:00