What Is the Nature of Software Vulnerability NI-64BG6SWQ-1?
Primary Software Version: 2012 SP1
Primary Software Fixed Version: N/A
Secondary Software: LabWindows/CVI Development Systems>>LabWindows/CVI Base Package
I’d like to understand how severe software vulnerability NI-64BG6SWQ-1 is so that I can make an informed decision about patching the affected software. What Is the Nature of Software Vulnerability NI-64BG6SWQ-1?
You can use the following information to assess the security risk of vulnerability NI-64BG6SWQ-1 to your environment.
Multiple ActiveX controls contain an ExportStyle() method that allows creation of an arbitrary file with the desired extension at an arbitrary location. An attacker can control file content by setting a ‘Caption’ or ‘FormatString’ property. The vulnerable controls in cwui.ocx are CWNumEdit, CWGraph, CWBoolean, CWSlide, and CWKnob.
Impact and exploitability:
This vulnerability allows remote attackers to execute arbitrary code with the same privileges as the current user. The targeted user must visit a malicious page using Microsoft Internet Explorer or open a malicious Microsoft Office file for an attacker to successfully exploit this vulnerability. National Instruments is not aware of any active attempts to exploit this issue.
CVSS Severity: High
This vulnerability affects the following major products, but other National Instruments products and versions are affected as well. To determine if your system is affected, download and run the May 2013 Security Verification Tool.
National Instruments has issued an update to affected products. For more information, refer to How Does NI Security Update 67L8K7QW Affect Me?.
In lieu of patching, users of affected products can add “kill bits” to the registry to prevent vulnerable ActiveX controls from being loaded in Microsoft Internet Explorer and Microsoft Office. For more information, refer to How Do Microsoft “Kill Bits” Affect NI ActiveX Components?
The NI Product Security Team published this advisory. You may direct questions about this advisory to security 'at' ni.com and find more information about National Instruments product security at http://www.ni.com/security.
Andrea Micalizzi, also known as rgod, discovered this vulnerability and reported it through Hewlett Packard’s Zero Day Initiative.
Report Date: 08/24/2013
Last Updated: 11/11/2014
Document ID: 6CN8NEAR