Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

1 vulnerability found for PatchJGD by Geospatial Information Authority of Japan

JVNDB-2017-000121

Vulnerability from jvndb - Published: 2017-06-08 15:31 - Updated:2018-01-24 12:15
Severity ?
Summary
The installer of PatchJGD provided by Geospatial Information Authority of Japan (GSI) may insecurely load Dynamic Link Libraries
Details
The installer of PatchJGD (PatchJGD101.EXE) provided by Geospatial Information Authority of Japan (GSI) contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427). Eili Masami of Tachibana Lab. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000121.html",
  "dc:date": "2018-01-24T12:15+09:00",
  "dcterms:issued": "2017-06-08T15:31+09:00",
  "dcterms:modified": "2018-01-24T12:15+09:00",
  "description": "The installer of PatchJGD (PatchJGD101.EXE) provided by Geospatial Information Authority of Japan (GSI) contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).\r\n\r\nEili Masami of Tachibana Lab. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000121.html",
  "sec:cpe": {
    "#text": "cpe:/a:gsi:patchjgd",
    "@product": "PatchJGD",
    "@vendor": "Geospatial Information Authority of Japan",
    "@version": "2.2"
  },
  "sec:cvss": [
    {
      "@score": "6.8",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
      "@version": "2.0"
    },
    {
      "@score": "7.8",
      "@severity": "High",
      "@type": "Base",
      "@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "@version": "3.0"
    }
  ],
  "sec:identifier": "JVNDB-2017-000121",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN52691241/index.html",
      "@id": "JVN#52691241",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2210",
      "@id": "CVE-2017-2210",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2017-2210",
      "@id": "CVE-2017-2210",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-Other",
      "@title": "No Mapping(CWE-Other)"
    }
  ],
  "title": "The installer of PatchJGD provided by Geospatial Information Authority of Japan (GSI) may insecurely load Dynamic Link Libraries"
}