7-Technologies TERMIS Unspecified Path Subversion Arbitrary DLL Injection Code Execution

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

A program installed on the remote Windows host is affected by an
insecure DLL loading vulnerability.

Description :

The installed version of 7-Technologies TERMIS on the remote Windows
host is 2.10 dated November 30, 2011 or earlier. As such, it
insecurely looks in its current working directory when resolving DLL
dependencies.

Attackers may exploit this issue by placing a specially crafted DLL
file and another file associated with the application in a location
controlled by the attacker. When the associated file is launched, the
attacker's arbitrary code can be executed.

This issue is corrected in newer versions of TERMIS by setting the
following registry key :

- SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File
Execution Options\termis.exe\CWDIllegalInDllSearch

Solution :

Update TERMIS to version 2.10 released after November 30, 2011.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: SCADA

Nessus Plugin ID: 58451 ()

Bugtraq ID: 52069

CVE ID: CVE-2012-0223