Vulnerabilites related to philips - smart_control_premium
CVE-2017-3210 (GCVE-0-2017-3210)
Vulnerability from cvelistv5
Published
2018-07-24 15:00
Modified
2024-08-05 14:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Applications developed using the Portrait Display SDK, versions 2.30 through 2.34, default to insecure configurations which allow arbitrary code execution. A number of applications developed using the Portrait Displays SDK do not use secure permissions when running. These applications run the component pdiservice.exe with NT AUTHORITY/SYSTEM permissions. This component is also read/writable by all Authenticated Users. This allows local authenticated attackers to run arbitrary code with SYSTEM privileges. The following applications have been identified by Portrait Displays as affected: Fujitsu DisplayView Click: Version 6.0 and 6.01. The issue was fixed in Version 6.3. Fujitsu DisplayView Click Suite: Version 5. The issue is addressed by patch in Version 5.9. HP Display Assistant: Version 2.1. The issue was fixed in Version 2.11. HP My Display: Version 2.0. The issue was fixed in Version 2.1. Philips Smart Control Premium: Versions 2.23, 2.25. The issue was fixed in Version 2.26.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Portrait Display | SDK |
Version: 2.30 < 2.34* |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:16:28.262Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "98006", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "https://www.securityfocus.com/bid/98006" }, { "name": "VU#219739", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/219739" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SDK", "vendor": "Portrait Display", "versions": [ { "lessThan": "2.34*", "status": "affected", "version": "2.30", "versionType": "custom" } ] } ], "datePublic": "2017-04-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Applications developed using the Portrait Display SDK, versions 2.30 through 2.34, default to insecure configurations which allow arbitrary code execution. A number of applications developed using the Portrait Displays SDK do not use secure permissions when running. These applications run the component pdiservice.exe with NT AUTHORITY/SYSTEM permissions. This component is also read/writable by all Authenticated Users. This allows local authenticated attackers to run arbitrary code with SYSTEM privileges. The following applications have been identified by Portrait Displays as affected: Fujitsu DisplayView Click: Version 6.0 and 6.01. The issue was fixed in Version 6.3. Fujitsu DisplayView Click Suite: Version 5. The issue is addressed by patch in Version 5.9. HP Display Assistant: Version 2.1. The issue was fixed in Version 2.11. HP My Display: Version 2.0. The issue was fixed in Version 2.1. Philips Smart Control Premium: Versions 2.23, 2.25. The issue was fixed in Version 2.26." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-24T14:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "98006", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "https://www.securityfocus.com/bid/98006" }, { "name": "VU#219739", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/219739" } ], "solutions": [ { "lang": "en", "value": "Thanks to Werner Schober of SEC Consult for reporting this vulnerability." } ], "source": { "discovery": "UNKNOWN" }, "title": "Applications developed using the Portrait Display SDK, versions 2.30 through 2.34, default to insecure configurations which allow arbitrary code execution", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2017-3210", "STATE": "PUBLIC", "TITLE": "Applications developed using the Portrait Display SDK, versions 2.30 through 2.34, default to insecure configurations which allow arbitrary code execution" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SDK", "version": { "version_data": [ { "affected": "\u003e", "version_affected": "\u003e", "version_name": "2.34", "version_value": "2.30" } ] } } ] }, "vendor_name": "Portrait Display" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Applications developed using the Portrait Display SDK, versions 2.30 through 2.34, default to insecure configurations which allow arbitrary code execution. A number of applications developed using the Portrait Displays SDK do not use secure permissions when running. These applications run the component pdiservice.exe with NT AUTHORITY/SYSTEM permissions. This component is also read/writable by all Authenticated Users. This allows local authenticated attackers to run arbitrary code with SYSTEM privileges. The following applications have been identified by Portrait Displays as affected: Fujitsu DisplayView Click: Version 6.0 and 6.01. The issue was fixed in Version 6.3. Fujitsu DisplayView Click Suite: Version 5. The issue is addressed by patch in Version 5.9. HP Display Assistant: Version 2.1. The issue was fixed in Version 2.11. HP My Display: Version 2.0. The issue was fixed in Version 2.1. Philips Smart Control Premium: Versions 2.23, 2.25. The issue was fixed in Version 2.26." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-276" } ] } ] }, "references": { "reference_data": [ { "name": "98006", "refsource": "BID", "url": "https://www.securityfocus.com/bid/98006" }, { "name": "VU#219739", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/219739" } ] }, "solution": [ { "lang": "en", "value": "Thanks to Werner Schober of SEC Consult for reporting this vulnerability." } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2017-3210", "datePublished": "2018-07-24T15:00:00", "dateReserved": "2016-12-05T00:00:00", "dateUpdated": "2024-08-05T14:16:28.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2018-07-24 15:29
Modified
2024-11-21 03:25
Severity ?
Summary
Applications developed using the Portrait Display SDK, versions 2.30 through 2.34, default to insecure configurations which allow arbitrary code execution. A number of applications developed using the Portrait Displays SDK do not use secure permissions when running. These applications run the component pdiservice.exe with NT AUTHORITY/SYSTEM permissions. This component is also read/writable by all Authenticated Users. This allows local authenticated attackers to run arbitrary code with SYSTEM privileges. The following applications have been identified by Portrait Displays as affected: Fujitsu DisplayView Click: Version 6.0 and 6.01. The issue was fixed in Version 6.3. Fujitsu DisplayView Click Suite: Version 5. The issue is addressed by patch in Version 5.9. HP Display Assistant: Version 2.1. The issue was fixed in Version 2.11. HP My Display: Version 2.0. The issue was fixed in Version 2.1. Philips Smart Control Premium: Versions 2.23, 2.25. The issue was fixed in Version 2.26.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | https://www.kb.cert.org/vuls/id/219739 | Third Party Advisory, US Government Resource | |
cret@cert.org | https://www.securityfocus.com/bid/98006 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/219739 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.securityfocus.com/bid/98006 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
portrait | portrait_display_sdk | * | |
fujitsu | displayview_click | 6.0 | |
fujitsu | displayview_click | 6.01 | |
fujitsu | displayview_click_suite | 5.0 | |
hp | display_assistant | 2.1 | |
hp | my_display | 2.0 | |
philips | smart_control_premium | 2.23 | |
philips | smart_control_premium | 2.25 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:portrait:portrait_display_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "B880BA41-30C2-40B7-8A42-D42DB378F303", "versionEndExcluding": "2.34", "versionStartIncluding": "2.30", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fujitsu:displayview_click:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E86AF784-46C3-4793-BECC-58183F3BD50D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fujitsu:displayview_click:6.01:*:*:*:*:*:*:*", "matchCriteriaId": "83868594-9F70-4961-8932-455890647854", "vulnerable": true }, { "criteria": "cpe:2.3:a:fujitsu:displayview_click_suite:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7AAD1654-2049-47D4-8EFA-57DFC7AF6108", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:display_assistant:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "365FF3B6-EEE3-404A-9C55-77E31A9DA6EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:my_display:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E155A15D-C3F7-46A5-8455-B5E643E09DB4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:philips:smart_control_premium:2.23:*:*:*:*:*:*:*", "matchCriteriaId": "92683BCE-0B6B-48B5-80C8-895307290E4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:philips:smart_control_premium:2.25:*:*:*:*:*:*:*", "matchCriteriaId": "45E861D9-7DF3-4E4C-904D-5B11E66D8DE2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Applications developed using the Portrait Display SDK, versions 2.30 through 2.34, default to insecure configurations which allow arbitrary code execution. A number of applications developed using the Portrait Displays SDK do not use secure permissions when running. These applications run the component pdiservice.exe with NT AUTHORITY/SYSTEM permissions. This component is also read/writable by all Authenticated Users. This allows local authenticated attackers to run arbitrary code with SYSTEM privileges. The following applications have been identified by Portrait Displays as affected: Fujitsu DisplayView Click: Version 6.0 and 6.01. The issue was fixed in Version 6.3. Fujitsu DisplayView Click Suite: Version 5. The issue is addressed by patch in Version 5.9. HP Display Assistant: Version 2.1. The issue was fixed in Version 2.11. HP My Display: Version 2.0. The issue was fixed in Version 2.1. Philips Smart Control Premium: Versions 2.23, 2.25. The issue was fixed in Version 2.26." }, { "lang": "es", "value": "Las aplicaciones que se desarrollan mediante Portrait Displays SDK, desde la versi\u00f3n 2.30 hasta la 2.34, vuelven por defecto a configuraciones inseguras que permiten la ejecuci\u00f3n de c\u00f3digo arbitrario. Una serie de aplicaciones desarrolladas con Portrait Displays SDK no emplean permisos seguros al ejecutarse. Estas aplicaciones ejecutan el componente pdiservice.exe con permisos AUTHORITY/SYSTEM. Este componente tambi\u00e9n puede ser le\u00eddo/escrito por todos los usuarios autenticados. Esto permite que atacantes locales autenticados ejecuten c\u00f3digo arbitrario con privilegios SYSTEM. Portrait Displays ha identificado que las siguientes aplicaciones se han visto afectadas: Fujitsu DisplayView Click: versiones 6.0 y 6.01. Este problema se ha solucionado en la versi\u00f3n 6.3. Fujitsu DisplayView Click Suite: versi\u00f3n 5. Este problema se ha solucionado mediante un parche en la versi\u00f3n 5.9. HP Display Assistant: versi\u00f3n 2.1. Este problema se ha solucionado en la versi\u00f3n 2.11. HP My Display: versi\u00f3n 2.0. Este problema se ha solucionado en la versi\u00f3n 2.1. Philips Smart Control Premium: versiones 2.23 y 2.25. Este problema se ha solucionado en la versi\u00f3n 2.26." } ], "id": "CVE-2017-3210", "lastModified": "2024-11-21T03:25:02.553", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-24T15:29:00.733", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/219739" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.securityfocus.com/bid/98006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/219739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.securityfocus.com/bid/98006" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "cret@cert.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-16" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }