How to Buy
This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.
A program installed on the remote Windows host is affected by an
insecure DLL loading vulnerability.
The installed version of 7-Technologies TERMIS on the remote Windows
host is 2.10 dated November 30, 2011 or earlier. As such, it
insecurely looks in its current working directory when resolving DLL
Attackers may exploit this issue by placing a specially crafted DLL
file and another file associated with the application in a location
controlled by the attacker. When the associated file is launched, the
attacker's arbitrary code can be executed.
This issue is corrected in newer versions of TERMIS by setting the
following registry key :
- SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File
Update TERMIS to version 2.10 released after November 30, 2011.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.7
Public Exploit Available : true
Nessus Plugin ID: 58451 ()
Bugtraq ID: 52069
CVE ID: CVE-2012-0223
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.