Remote code execution in InPage

Published: 2016-11-23 13:08:17 | Updated: 2017-11-04 12:09:08
Severity Critical
Patch available YES
Number of vulnerabilities 1
CVSSv2 8.1 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C)
CVSSv3 8.6 [CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C]
CVE ID CVE-2017-12824
CWE ID CWE-119
Exploitation vector Network
Public exploit This vulnerability is being exploited in the wild.
Vulnerable software InPage
Vulnerable software versions InPage 2016
InPage 2015
InPage 2014
InPage 2009
Vendor URL Concept Software Private Limited
Advisory type Public

Security Advisory

1) Buffer overflow

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists within text processor when parsing .inp files. A remote attacker can create a specially crafted .inp file, trick the victim to open it and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in full system compromise.

Note: this vulnerability is being actively exploited in the wild against financial institutions in Asia. The latest attack report is dated November 3, 2017.

Remediation

Install update from vendor's website. Reportedly, version 3.6.0 fixes the vulnerability.

External links

https://securelist.com/blog/research/76717/inpage-zero-day-exploit-used-to-attack-financial-institutions-in-asia/
https://researchcenter.paloaltonetworks.com/2017/11/unit42-recent-inpage-exploits-lead-multiple-malw...

Back to List