{"vuid":"VU#219739","idnumber":"219739","name":"Portrait Displays SDK applications are vulnerable to arbitrary code execution and privilege escalation","keywords":["CWE-276","arbitrary code execution","privilege escalation","insecure default configuration"],"overview":"Applications developed using the Portrait Display SDK, versions 2.30 through 2.34, default to insecure configurations which allow arbitrary code execution.","clean_desc":"CWE-276: Incorrect Default Permissions  - CVE-2017-3210\nA number of applications developed using the Portrait Displays SDK do not use secure permissions when running. These applications run the component pdiservice.exe with NT AUTHORITY/SYSTEM permissions. This component is also read/writable by all Authenticated Users. This allows local authenticated attackers to run arbitrary code with SYSTEM privileges. The following applications have been identified by Portrait Displays as affected: Fujitsu DisplayView Click: Version 6.0 and 6.01\nThe issue was fixed in Version 6.3 Fujitsu DisplayView Click Suite: Version 5\nThe issue is addressed by patch in Version 5.9 HP Display Assistant: Version 2.1\nThe issue was fixed in Version 2.11 HP My Display: Version 2.0\nThe issue was fixed in Version 2.1 Philips Smart Control Premium: Versions 2.23, 2.25\nThe issue was fixed in Version 2.26","impact":"A local authenticated (non-privileged) attacker can run arbitrary code with SYSTEM privileges.","resolution":"Apply an update\nEnsure that affected applications are updated to the most recent versions. Portrait Displays has provided patch for affected applications. If you are unable to update your software, please see the following workarounds:","workarounds":"Manually remove unsafe permissions Using the following command you can remove read/write permissions from \"Authenticated Users\": sc sdset pdiservice D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)\n(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)","sysaffected":"","thanks":"Thanks to Werner Schober of SEC Consult for reporting this vulnerability.","author":"This document was written by Trent Novelly.","public":["http://www.portrait.com/securityupdate.html","https://www.sec-consult.com/en/Vulnerability-Lab/Advisories.htm","http://blog.sec-consult.com/"],"cveids":["CVE-2017-3210"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2017-03-03T15:06:06Z","publicdate":"2017-04-24T00:00:00Z","datefirstpublished":"2017-04-25T16:58:41Z","dateupdated":"2017-04-25T16:58:43Z","revision":10,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"L","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.8","cvss_basevector":"AV:L/AC:L/Au:S/C:C/I:C/A:C","cvss_temporalscore":"5.9","cvss_environmentalscore":"1.47237608448","cvss_environmentalvector":"CDP:ND/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}