Scientific Toolworks Understand 'wintab32.dll' DLL Loading Arbitrary Code Execution

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.


Synopsis :

A program installed on the remote Windows host is affected by an
insecure DLL loading vulnerability.

Description :

The version of Scientific Toolworks Understand installed on the remote
Windows host is earlier than 2.6 Build 600. As such, it insecurely
looks in its current working directory when resolving DLL
dependencies, such as for 'wintab32.dll'.

Attackers may exploit this issue by placing a specially crafted DLL
file and another file associated with the application in a location
controlled by the attacker. When the associated file is launched, the
attacker's arbitrary code can be executed.

See also :

http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5071.php
http://www.scitools.com/support/buildLogs.php

Solution :

Upgrade to version 2.6 Build 600 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 57891 ()

Bugtraq ID: 51910

CVE ID: CVE-2012-4755

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now