cvelist/2017/3xxx/CVE-2017-3210.json

79 lines
3.2 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-17 22:44:18 +00:00
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2017-3210",
"STATE": "PUBLIC",
"TITLE": "Applications developed using the Portrait Display SDK, versions 2.30 through 2.34, default to insecure configurations which allow arbitrary code execution"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SDK",
"version": {
"version_data": [
{
"affected": ">",
"version_name": "2.34",
"version_value": "2.30"
}
]
}
}
]
},
"vendor_name": "Portrait Display"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2018-07-20 15:18:36 -04:00
{
2019-03-17 22:44:18 +00:00
"lang": "eng",
"value": "Applications developed using the Portrait Display SDK, versions 2.30 through 2.34, default to insecure configurations which allow arbitrary code execution. A number of applications developed using the Portrait Displays SDK do not use secure permissions when running. These applications run the component pdiservice.exe with NT AUTHORITY/SYSTEM permissions. This component is also read/writable by all Authenticated Users. This allows local authenticated attackers to run arbitrary code with SYSTEM privileges. The following applications have been identified by Portrait Displays as affected: Fujitsu DisplayView Click: Version 6.0 and 6.01. The issue was fixed in Version 6.3. Fujitsu DisplayView Click Suite: Version 5. The issue is addressed by patch in Version 5.9. HP Display Assistant: Version 2.1. The issue was fixed in Version 2.11. HP My Display: Version 2.0. The issue was fixed in Version 2.1. Philips Smart Control Premium: Versions 2.23, 2.25. The issue was fixed in Version 2.26."
2018-07-20 15:18:36 -04:00
}
2019-03-17 22:44:18 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-276"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "98006",
"refsource": "BID",
"url": "https://www.securityfocus.com/bid/98006"
},
{
"name": "VU#219739",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/219739"
}
]
},
"solution": [
{
"lang": "eng",
"value": "Thanks to Werner Schober of SEC Consult for reporting this vulnerability."
}
],
"source": {
"discovery": "UNKNOWN"
}
}