QlikView < 11.20 SR1 qvw File Format Parser Integer Overflow

high Nessus Plugin ID 65811

Synopsis

The remote Windows host has an application that is affected by a remote integer overflow vulnerability.

Description

The version of QlikView is prior to 11.2 SR1 (11.20.11718). As such, it is affected by an integer overflow vulnerability that exists in the '.qvw' file format parser.

An attacker could exploit this issue by tricking a user into opening a specially crafted file, resulting in arbitrary code execution.

Solution

Upgrade to QlikView 11.20 SR1 (11.20.11718) or later.

See Also

http://www.nessus.org/u?170e3559

https://seclists.org/bugtraq/2013/Mar/75

http://www.nessus.org/u?71b0a975

Plugin Details

Severity: High

ID: 65811

File Name: qlikview_11_20_sr1.nasl

Version: 1.5

Type: local

Agent: windows

Family: Windows

Published: 4/4/2013

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:qlik:qlikview

Required KB Items: SMB/Registry/Enumerated, SMB/qlikview/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/6/2013

Vulnerability Publication Date: 3/13/2013

Reference Information

BID: 58463