jvndb-2018-000057
Vulnerability from jvndb
Published
2018-05-29 13:47
Modified
2019-12-27 18:09
Severity ?
Summary
The installer of "FLET'S VIRUS CLEAR Easy Setup & Application Tool" and "FLET'S VIRUS CLEAR v6 Easy Setup & Application Tool" may insecurely invoke an executable file
Details
The installer of "FLET'S VIRUS CLEAR Easy Setup & Application Tool" and "FLET'S VIRUS CLEAR v6 Easy Setup & Application Tool" provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION contains an issue with the DLL search path, which may lead to insecurely invoke an executable file (CWE-427).
DigiGnome reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000057.html",
"dc:date": "2019-12-27T18:09+09:00",
"dcterms:issued": "2018-05-29T13:47+09:00",
"dcterms:modified": "2019-12-27T18:09+09:00",
"description": "The installer of \"FLET\u0027S VIRUS CLEAR Easy Setup \u0026 Application Tool\" and \"FLET\u0027S VIRUS CLEAR v6 Easy Setup \u0026 Application Tool\" provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION contains an issue with the DLL search path, which may lead to insecurely invoke an executable file (CWE-427).\r\n\r\nDigiGnome reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000057.html",
"sec:cpe": [
{
"#text": "cpe:/a:ntt_east:flet%27s_virus_clear_easy_setup_%26_application_tool",
"@product": "FLET\u0027S VIRUS CLEAR Easy Setup \u0026 Application Tool",
"@vendor": "NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION",
"@version": "2.2"
},
{
"#text": "cpe:/a:ntt_east:flet%27s_virus_clear_v6_easy_setup_%26_application_tool",
"@product": "FLET\u0027S VIRUS CLEAR v6 Easy Setup \u0026 Application Tool",
"@vendor": "NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION",
"@version": "2.2"
}
],
"sec:cvss": [
{
"@score": "6.8",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"@version": "2.0"
},
{
"@score": "7.8",
"@severity": "High",
"@type": "Base",
"@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2018-000057",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN20040004/index.html",
"@id": "JVN#20040004",
"@source": "JVN"
},
{
"#text": "http://jvn.jp/en/ta/JVNTA91240916/",
"@id": "JVNTA#91240916",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0563",
"@id": "CVE-2018-0563",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2018-0563",
"@id": "CVE-2018-0563",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-Other",
"@title": "No Mapping(CWE-Other)"
}
],
"title": "The installer of \"FLET\u0027S VIRUS CLEAR Easy Setup \u0026 Application Tool\" and \"FLET\u0027S VIRUS CLEAR v6 Easy Setup \u0026 Application Tool\" may insecurely invoke an executable file"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…