Vulnerability Description
An exploitable memory corruption vulnerability exists in the RSRC segment parsing functionality of LabVIEW 2017, LabVIEW 2016, LabVIEW 2015, and LabVIEW 2014. A specially crafted Virtual Instrument (VI) file can cause an attacker controlled looping condition resulting in an arbitrary null write. An attacker controlled VI file can be used to trigger this vulnerability and can potentially result in code execution.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ni | Labview | 2014 |
Related Weaknesses (CWE)
References
- http://www.ni.com/product-documentation/54099/en/MitigationVendor Advisory
- http://www.securityfocus.com/bid/100519Third Party AdvisoryVDB Entry
- https://0patch.blogspot.com/2017/09/0patching-rsrc-arbitrary-null-write.htmlExploitPatchThird Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0273ExploitThird Party AdvisoryVDB Entry
- http://www.ni.com/product-documentation/54099/en/MitigationVendor Advisory
- http://www.securityfocus.com/bid/100519Third Party AdvisoryVDB Entry
- https://0patch.blogspot.com/2017/09/0patching-rsrc-arbitrary-null-write.htmlExploitPatchThird Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0273ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2017-2779?
CVE-2017-2779 is a vulnerability with a CVSS score of 7.5 (HIGH). An exploitable memory corruption vulnerability exists in the RSRC segment parsing functionality of LabVIEW 2017, LabVIEW 2016, LabVIEW 2015, and LabVIEW 2014. A specially crafted Virtual Instrument (V...
How severe is CVE-2017-2779?
CVE-2017-2779 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-2779?
Check the references section above for vendor advisories and patch information. Affected products include: Ni Labview.