Check Point Reference: | CPAI-2013-2487 |
Date Published: | 25 Aug 2013 |
Severity: | Medium |
Last Updated: | Monday 06 January, 2025 |
Source: | |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | National Instruments Installer Framework 1.1 |
Vulnerability Description | An arbitrary file writing vulnerability exists in the National Instruments Installer Framework. |
Vulnerability Details | Successful exploitation would allow an attacker to create arbitrary files with attacker controlled contents, which could eventually lead to arbitrary command execution on the target machine. The vulnerability is due to lack of input sanitation, which permits directory traversal in the ExportStyle() method. Remote attackers to create/overwrite arbitrary files with arbitrary file extensions through the fileName parameter. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Web Client Enforcement Violation
Attack Information: National Instruments Installer Framework Multiple ActiveX Arbitrary File Creation