First published: Tue Aug 06 2013(Updated: )
Absolute path traversal vulnerability in the 3D Graph ActiveX control in cw3dgrph.ocx in National Instruments LabWindows/CVI 2012 SP1 and earlier, LabVIEW 2012 SP1 and earlier, and other products allows remote attackers to create and execute arbitrary files via a full pathname in an argument to the ExportStyle method, in conjunction with file content in the (1) Caption or (2) FormatString property value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
National Instruments LabVIEW | <=2012 | |
NI LabVIEW | <=2012 | |
NI MeasurementStudio | <=2013 | |
NI TestStand | <=2012 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5022 is classified as a high severity vulnerability due to its potential for remote code execution.
The fix for CVE-2013-5022 involves upgrading to a patched version of the affected software, specifically versions later than LabWindows/CVI 2012 SP1, LabVIEW 2012 SP1, and the respective versions of Measurement Studio and TestStand.
CVE-2013-5022 affects National Instruments LabVIEW, LabWindows/CVI, Measurement Studio, and TestStand versions up to and including 2012 SP1.
CVE-2013-5022 is an absolute path traversal vulnerability that allows attackers to execute arbitrary files.
Yes, CVE-2013-5022 can be exploited remotely by attackers who can manipulate input to the vulnerable ActiveX control.