National Instruments LabVIEW 2015 < 2015 SP1 f7 / 2016 < 2016 f2 LvVarientUnflatten VI File Handling Arbitrary Code Execution

high Nessus Plugin ID 99928

Synopsis

An application installed on the remote Windows host is affected by an arbitrary code execution vulnerability.

Description

The version of National Instruments (NI) LabVIEW installed on the remote Windows host is version 2015 prior to 2015 SP1 f7 or 2016 prior to 2016 f2. It is, therefore, affected by an arbitrary code execution vulnerability in the LvVarientUnflatten functionality due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, by convincing a user to open a specially crafted VI file, to cause a heap-based buffer overflow, allowing the execution of arbitrary code.

Solution

Upgrade to NI LabVIEW version 2015 SP1 f7 (2015.1.7) / 2016 f2 (2016.0.2) or later.

See Also

http://www.ni.com/product-documentation/53294/en/

http://www.ni.com/product-documentation/53281/en/

http://www.ni.com/labview/product-lifecycle/

http://www.talosintelligence.com/reports/TALOS-2017-0269/

http://www.nessus.org/u?d98a385a

Plugin Details

Severity: High

ID: 99928

File Name: labview_cve-2017-2775.nasl

Version: 1.8

Type: local

Agent: windows

Family: Windows

Published: 5/2/2017

Updated: 6/12/2020

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2017-2775

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ni:labview

Required KB Items: SMB/Registry/Enumerated, installed_sw/National Instruments LabVIEW

Exploit Ease: No known exploits are available

Patch Publication Date: 3/2/2017

Vulnerability Publication Date: 3/22/2017

Reference Information

CVE: CVE-2017-2775

BID: 97020