JVN#87403477: Application and self-extracting archive containing the application of "FLET'S v4 / v6 address selection tool" may insecurely load Dynamic Link Libraries
2018-02-13T00:00:00
ID JVN:87403477 Type jvn Reporter Japan Vulnerability Notes Modified 2018-02-13T00:00:00
Description
## Description
Application and self-extracting archive containing the application of "FLET'S v4 / v6 address selection tool" provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).
## Impact
Arbitrary code may be executed with the privilege of the user invoking the application or the self-extracting archive.
## Solution
Do not use "FLET'S v4 / v6 address selection tool"
Distribution and support of "FLET'S v4 / v6 address selection tool" was ended as of 2018 February 7.
Stop using "FLET'S v4 / v6 address selection tool".
If "FLET'S v4 / v6 address selection tool" obtained from the website before 2018 February 7 resides in your computer and has not yet been installed, do not install it. Delete the executable file immediately.
## Products Affected
FLET'S v4 / v6 address selection tool
{"id": "JVN:87403477", "bulletinFamily": "info", "title": "JVN#87403477: Application and self-extracting archive containing the application of \"FLET'S v4 / v6 address selection tool\" may insecurely load Dynamic Link Libraries", "description": "\n ## Description\n\nApplication and self-extracting archive containing the application of \"FLET'S v4 / v6 address selection tool\" provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries ([CWE-427](<https://cwe.mitre.org/data/definitions/427.html>)).\n\n ## Impact\n\nArbitrary code may be executed with the privilege of the user invoking the application or the self-extracting archive.\n\n ## Solution\n\n**Do not use \"FLET'S v4 / v6 address selection tool\"** \nDistribution and support of \"FLET'S v4 / v6 address selection tool\" was ended as of 2018 February 7. \nStop using \"FLET'S v4 / v6 address selection tool\". \n \nIf \"FLET'S v4 / v6 address selection tool\" obtained from the website before 2018 February 7 resides in your computer and has not yet been installed, do not install it. Delete the executable file immediately.\n\n ## Products Affected\n\n * FLET'S v4 / v6 address selection tool\n", "published": "2018-02-13T00:00:00", "modified": "2018-02-13T00:00:00", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "href": "http://jvn.jp/en/jp/JVN87403477/index.html", "reporter": "Japan Vulnerability Notes", "references": [], "cvelist": ["CVE-2018-0516"], "type": "jvn", "lastseen": "2019-05-29T19:49:33", "edition": 5, "viewCount": 4, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2018-0516"]}], "modified": "2019-05-29T19:49:33", "rev": 2}, "score": {"value": 6.1, "vector": "NONE", "modified": "2019-05-29T19:49:33", "rev": 2}, "vulnersScore": 6.1}, "scheme": null}