First published: Tue Jul 24 2018(Updated: )
Applications developed using the Portrait Display SDK, versions 2.30 through 2.34, default to insecure configurations which allow arbitrary code execution. A number of applications developed using the Portrait Displays SDK do not use secure permissions when running. These applications run the component pdiservice.exe with NT AUTHORITY/SYSTEM permissions. This component is also read/writable by all Authenticated Users. This allows local authenticated attackers to run arbitrary code with SYSTEM privileges. The following applications have been identified by Portrait Displays as affected: Fujitsu DisplayView Click: Version 6.0 and 6.01. The issue was fixed in Version 6.3. Fujitsu DisplayView Click Suite: Version 5. The issue is addressed by patch in Version 5.9. HP Display Assistant: Version 2.1. The issue was fixed in Version 2.11. HP My Display: Version 2.0. The issue was fixed in Version 2.1. Philips Smart Control Premium: Versions 2.23, 2.25. The issue was fixed in Version 2.26.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Portrait Portrait Display Sdk | >=2.30<2.34 | |
Fujitsu DisplayView Click | =6.0 | |
Fujitsu DisplayView Click | =6.01 | |
Fujitsu DisplayView Click Suite | =5.0 | |
HP Display Assistant | =2.1 | |
HP My Display | =2.0 | |
Philips Smart Control Premium | =2.23 | |
Philips Smart Control Premium | =2.25 |
Thanks to Werner Schober of SEC Consult for reporting this vulnerability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2017-3210.
Applications developed using the Portrait Display SDK versions 2.30 through 2.34, Fujitsu DisplayView Click versions 6.0 and 6.01, Fujitsu DisplayView Click Suite version 5.0, HP Display Assistant version 2.1, HP My Display version 2.0, Philips Smart Control Premium versions 2.23 and 2.25 are affected by this vulnerability.
The severity level of this vulnerability is high.
The Common Weakness Enumeration (CWE) IDs for this vulnerability are CWE-16 and CWE-276.
To fix this vulnerability, ensure that the affected applications are updated to a secure version or contact the software provider for a patch.