National Instruments LabVIEW 2015 < 2015 SP1 f7 / 2016 < 2016 f2 LvVarientUnflatten VI File Handling Arbitrary Code Execution

High Nessus Plugin ID 99928


An application installed on the remote Windows host is affected by an arbitrary code execution vulnerability.


The version of National Instruments (NI) LabVIEW installed on the remote Windows host is version 2015 prior to 2015 SP1 f7 or 2016 prior to 2016 f2. It is, therefore, affected by an arbitrary code execution vulnerability in the LvVarientUnflatten functionality due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, by convincing a user to open a specially crafted VI file, to cause a heap-based buffer overflow, allowing the execution of arbitrary code.


Upgrade to NI LabVIEW version 2015 SP1 f7 (2015.1.7) / 2016 f2 (2016.0.2) or later.

See Also

Plugin Details

Severity: High

ID: 99928

File Name: labview_cve-2017-2775.nasl

Version: $Revision: 1.3 $

Type: local

Agent: windows

Family: Windows

Published: 2017/05/02

Modified: 2018/02/28

Dependencies: 99929

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ni:labview

Required KB Items: installed_sw/National Instruments LabVIEW, SMB/Registry/Enumerated

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2017/03/02

Vulnerability Publication Date: 2017/03/22

Reference Information

CVE: CVE-2017-2775

BID: 97020

OSVDB: 154247