Untrusted search path vulnerability in "i-filter 6.0 installer" timestamp of code signing is before 23 Aug 2017 (JST) allows an attacker to execute arbitrary code via a specially crafted executable file in an unspecified directory.
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
Link | Tags |
---|---|
http://www.daj.jp/cs/info/2017/0912/ | vendor advisory |
http://www.securityfocus.com/bid/100916 | vdb entry |
https://jvn.jp/en/jp/JVN75929834/index.html | vdb entry third party advisory |