Executive Summary

Summary
Title Portrait Displays SDK applications are vulnerable to arbitrary code execution and privilege escalation
Informations
Name VU#219739 First vendor Publication 2017-04-25
Vendor VU-CERT Last vendor Modification 2017-04-25
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#219739

Portrait Displays SDK applications are vulnerable to arbitrary code execution and privilege escalation

Original Release date: 25 Apr 2017 | Last revised: 25 Apr 2017

Overview

Applications developed using the Portrait Display SDK, versions 2.30 through 2.34, default to insecure configurations which allow arbitrary code execution.

Description

CWE-276: Incorrect Default Permissions - CVE-2017-3210

A number of applications developed using the Portrait Displays SDK do not use secure permissions when running. These applications run the component pdiservice.exe with NT AUTHORITY/SYSTEM permissions. This component is also read/writable by all Authenticated Users. This allows local authenticated attackers to run arbitrary code with SYSTEM privileges.

The following applications have been identified by Portrait Displays as affected:

  • Fujitsu DisplayView Click: Version 6.0 and 6.01
    The issue was fixed in Version 6.3
  • Fujitsu DisplayView Click Suite: Version 5
    The issue is addressed by patch in Version 5.9
  • HP Display Assistant: Version 2.1
    The issue was fixed in Version 2.11
  • HP My Display: Version 2.0
    The issue was fixed in Version 2.1
  • Philips Smart Control Premium: Versions 2.23, 2.25
    The issue was fixed in Version 2.26

Impact

A local authenticated (non-privileged) attacker can run arbitrary code with SYSTEM privileges.

Solution

Apply an update
Ensure that affected applications are updated to the most recent versions.
Portrait Displays has provided patch for affected applications.

If you are unable to update your software, please see the following workarounds:

Manually remove unsafe permissions

Using the following command you can remove read/write permissions from "Authenticated Users":

sc sdset pdiservice D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)
(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Portrait DisplaysAffected15 Mar 201724 Apr 2017
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base6.8AV:L/AC:L/Au:S/C:C/I:C/A:C
Temporal5.9E:ND/RL:OF/RC:C
Environmental1.5CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

References

  • http://www.portrait.com/securityupdate.html
  • https://www.sec-consult.com/en/Vulnerability-Lab/Advisories.htm
  • http://blog.sec-consult.com/

Credit

Thanks to Werner Schober of SEC Consult for reporting this vulnerability.

This document was written by Trent Novelly.

Other Information

  • CVE IDs:CVE-2017-3210
  • Date Public:24 Apr 2017
  • Date First Published:25 Apr 2017
  • Date Last Updated:25 Apr 2017
  • Document Revision:10

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/219739

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-16 Configuration

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2
Application 1
Application 1
Application 1
Application 2
Application 1

Nessus® Vulnerability Scanner

Date Description
2017-04-28 Name : The Portrait Displays SDK Service (PdiService) running on the remote Windows ...
File : portrait_display_sdk_cve-2017-3210.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2018-10-17 21:22:14
  • Multiple Updates
2018-07-24 21:21:46
  • Multiple Updates
2017-04-29 13:25:02
  • Multiple Updates
2017-04-25 21:23:03
  • First insertion