7-Technologies TERMIS Unspecified Path Subversion Arbitrary DLL Injection Code Execution

This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.


Synopsis :

A program installed on the remote Windows host is affected by an
insecure DLL loading vulnerability.

Description :

The installed version of 7-Technologies TERMIS on the remote Windows
host is 2.10 dated November 30, 2011 or earlier. As such, it
insecurely looks in its current working directory when resolving DLL
dependencies.

Attackers may exploit this issue by placing a specially crafted DLL
file and another file associated with the application in a location
controlled by the attacker. When the associated file is launched, the
attacker's arbitrary code can be executed.

This issue is corrected in newer versions of TERMIS by setting the
following registry key :

- SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File
Execution Options\termis.exe\CWDIllegalInDllSearch

Solution :

Update TERMIS to version 2.10 released after November 30, 2011.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: SCADA

Nessus Plugin ID: 58451 ()

Bugtraq ID: 52069

CVE ID: CVE-2012-0223

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial