ID

VAR-201202-0238


CVE

CVE-2012-0223


TITLE

7T TERMIS Untrusted Search Path Vulnerability

Trust: 1.6

sources: IVD: 1801b8ec-2354-11e6-abef-000c29c66e3d // IVD: 7d78980f-463f-11e9-b9e0-000c29342cb1 // CNVD: CNVD-2012-9016 // CNNVD: CNNVD-201202-424

DESCRIPTION

Untrusted search path vulnerability in 7-Technologies (7T) TERMIS 2.10 and earlier allows local users to gain privileges via a Trojan horse DLL in the current working directory, a different vulnerability than CVE-2012-0224. 7-Technologies (7T) TERMIS Contains a vulnerability that allows it to get permission due to a flaw in search path processing. DLL It may be possible to get permission through the file. An attacker can exploit this issue by enticing a legitimate user to use the vulnerable application to open a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file. TERMIS 2.10 is vulnerable; other versions may also be affected. ---------------------------------------------------------------------- Secunia presentations @ RSA Conference 2012, San Francisco, USA, 27 Feb-02 March Listen to our Chief Security Specialist, Research Analyst Director, and Director Product Management & Quality Assurance discuss the industry's key topics. Also, visit the Secunia stand #817. Find out more: http://www.rsaconference.com/events/2012/usa/index.htm ---------------------------------------------------------------------- TITLE: 7-Technologies AQUIS / TERMIS Insecure Library Loading Vulnerability SECUNIA ADVISORY ID: SA48093 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48093/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48093 RELEASE DATE: 2012-02-20 DISCUSS ADVISORY: http://secunia.com/advisories/48093/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48093/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48093 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in AQUIS and TERMIS, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to the application loading unspecified libraries in an insecure manner. This can be exploited to load arbitrary libraries by tricking a user into e.g. opening a certain file located on a remote WebDAV or SMB share. The vulnerability is reported in the following products: * AQUIS version 1.5 dated October 13, 2011 and prior. * TERMIS version 2.10 dated November 30, 2011 and prior. SOLUTION: Apply patches. Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ PROVIDED AND/OR DISCOVERED BY: ICS-CERT credits Kuang-Chun Hung, Security Research and Service Institute−Information and Communication Security Technology Center (ICST). ORIGINAL ADVISORY: ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-12-025-01.pdf http://www.us-cert.gov/control_systems/pdf/ICSA-12-025-02.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.88

sources: NVD: CVE-2012-0223 // JVNDB: JVNDB-2011-003690 // CNVD: CNVD-2012-9016 // BID: 52069 // IVD: 1801b8ec-2354-11e6-abef-000c29c66e3d // IVD: 7d78980f-463f-11e9-b9e0-000c29342cb1 // PACKETSTORM: 109960

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: 1801b8ec-2354-11e6-abef-000c29c66e3d // IVD: 7d78980f-463f-11e9-b9e0-000c29342cb1 // CNVD: CNVD-2012-9016

AFFECTED PRODUCTS

vendor:7tmodel:termisscope:eqversion:2.0

Trust: 1.6

vendor:7tmodel:termisscope:lteversion:2.10

Trust: 1.0

vendor:7model:termisscope:eqversion:2.10

Trust: 0.9

vendor:7model:termisscope:lteversion:2.10

Trust: 0.8

vendor:7tmodel:termisscope:eqversion:2.10

Trust: 0.6

vendor:termismodel: - scope:eqversion:2.0

Trust: 0.4

vendor:termismodel: - scope:eqversion:*

Trust: 0.4

sources: IVD: 1801b8ec-2354-11e6-abef-000c29c66e3d // IVD: 7d78980f-463f-11e9-b9e0-000c29342cb1 // CNVD: CNVD-2012-9016 // BID: 52069 // JVNDB: JVNDB-2011-003690 // NVD: CVE-2012-0223 // CNNVD: CNNVD-201202-424

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2012-0223
value: HIGH

Trust: 1.8

CNVD: CNVD-2012-9016
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201202-424
value: CRITICAL

Trust: 0.6

IVD: 1801b8ec-2354-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: 7d78980f-463f-11e9-b9e0-000c29342cb1
value: CRITICAL

Trust: 0.2

NVD:
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: TRUE
version: 2.0

Trust: 1.0

NVD: CVE-2012-0223
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2012-9016
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 1801b8ec-2354-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 7d78980f-463f-11e9-b9e0-000c29342cb1
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 1801b8ec-2354-11e6-abef-000c29c66e3d // IVD: 7d78980f-463f-11e9-b9e0-000c29342cb1 // CNVD: CNVD-2012-9016 // JVNDB: JVNDB-2011-003690 // NVD: CVE-2012-0223 // CNNVD: CNNVD-201202-424

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2011-003690 // NVD: CVE-2012-0223

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201202-424

TYPE

other

Trust: 1.0

sources: IVD: 1801b8ec-2354-11e6-abef-000c29c66e3d // IVD: 7d78980f-463f-11e9-b9e0-000c29342cb1 // CNNVD: CNNVD-201202-424

CONFIGURATIONS

sources: NVD: CVE-2012-0223

PATCH

title:TERMISurl:http://www.7t.dk/products/termis/index.aspx

Trust: 0.8

title:7T TERMIS Untrusted Search Path Vulnerability Patchurl:https://www.cnvd.org.cn/patchinfo/show/34071

Trust: 0.6

title:TERMIS_2.10_18-01-2012url:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=42707

Trust: 0.6

title:AQUIS_1.5_14-12-2011url:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=42706

Trust: 0.6

sources: CNVD: CNVD-2012-9016 // JVNDB: JVNDB-2011-003690 // CNNVD: CNNVD-201202-424

EXTERNAL IDS

db:NVDid:CVE-2012-0223

Trust: 3.7

db:ICS CERTid:ICSA-12-025-02A

Trust: 2.4

db:BIDid:52069

Trust: 1.5

db:CNVDid:CNVD-2012-9016

Trust: 1.0

db:CNNVDid:CNNVD-201202-424

Trust: 1.0

db:JVNDBid:JVNDB-2011-003690

Trust: 0.8

db:ICS CERTid:ICSA-12-025-02

Trust: 0.4

db:IVDid:1801B8EC-2354-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:7D78980F-463F-11E9-B9E0-000C29342CB1

Trust: 0.2

db:SECUNIAid:48093

Trust: 0.2

db:ICS CERTid:ICSA-12-025-01

Trust: 0.1

db:PACKETSTORMid:109960

Trust: 0.1

sources: IVD: 1801b8ec-2354-11e6-abef-000c29c66e3d // IVD: 7d78980f-463f-11e9-b9e0-000c29342cb1 // CNVD: CNVD-2012-9016 // BID: 52069 // JVNDB: JVNDB-2011-003690 // PACKETSTORM: 109960 // NVD: CVE-2012-0223 // CNNVD: CNNVD-201202-424

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-025-02a.pdf

Trust: 2.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0223

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0223

Trust: 0.8

url:http://www.securityfocus.com/bid/52069/info

Trust: 0.6

url:http://www.securityfocus.com/bid/52069

Trust: 0.6

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-025-02.pdf

Trust: 0.4

url:http://blog.rapid7.com/?p=5325

Trust: 0.3

url:http://blog.metasploit.com/2010/08/exploiting-dll-hijacking-flaws.html

Trust: 0.3

url:http://blogs.technet.com/b/srd/archive/2010/08/23/more-information-about-dll-preloading-remote-attack-vector.aspx

Trust: 0.3

url:http://www.7t.dk/products/termis/product-information/termis-operation.aspx

Trust: 0.3

url:http://secunia.com/advisories/48093/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://www.rsaconference.com/events/2012/usa/index.htm

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/48093/

Trust: 0.1

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-025-01.pdf

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48093

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-9016 // BID: 52069 // JVNDB: JVNDB-2011-003690 // PACKETSTORM: 109960 // NVD: CVE-2012-0223 // CNNVD: CNNVD-201202-424

CREDITS

Kuang-Chun Hung

Trust: 0.9

sources: BID: 52069 // CNNVD: CNNVD-201202-424

SOURCES

db:IVDid:1801b8ec-2354-11e6-abef-000c29c66e3d
db:IVDid:7d78980f-463f-11e9-b9e0-000c29342cb1
db:CNVDid:CNVD-2012-9016
db:BIDid:52069
db:JVNDBid:JVNDB-2011-003690
db:PACKETSTORMid:109960
db:NVDid:CVE-2012-0223
db:CNNVDid:CNNVD-201202-424

LAST UPDATE DATE

2023-12-18T13:09:44.205000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-9016date:2012-02-23T00:00:00
db:BIDid:52069date:2012-02-21T18:40:00
db:JVNDBid:JVNDB-2011-003690date:2012-02-23T00:00:00
db:NVDid:CVE-2012-0223date:2012-02-22T13:54:02.007
db:CNNVDid:CNNVD-201202-424date:2012-02-23T00:00:00

SOURCES RELEASE DATE

db:IVDid:1801b8ec-2354-11e6-abef-000c29c66e3ddate:2012-02-23T00:00:00
db:IVDid:7d78980f-463f-11e9-b9e0-000c29342cb1date:2012-02-23T00:00:00
db:CNVDid:CNVD-2012-9016date:2012-02-23T00:00:00
db:BIDid:52069date:2012-02-17T00:00:00
db:JVNDBid:JVNDB-2011-003690date:2012-02-23T00:00:00
db:PACKETSTORMid:109960date:2012-02-20T06:42:07
db:NVDid:CVE-2012-0223date:2012-02-22T13:54:02.007
db:CNNVDid:CNNVD-201202-424date:1900-01-01T00:00:00