An exploitable memory corruption vulnerability exists in the RSRC segment parsing functionality of LabVIEW 2017, LabVIEW 2016, LabVIEW 2015, and LabVIEW 2014. A specially crafted Virtual Instrument (VI) file can cause an attacker controlled looping condition resulting in an arbitrary null write. An attacker controlled VI file can be used to trigger this vulnerability and can potentially result in code execution.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0273 | Exploit Third Party Advisory VDB Entry | 
| http://www.ni.com/product-documentation/54099/en/ | Mitigation Vendor Advisory | 
| http://www.securityfocus.com/bid/100519 | Third Party Advisory VDB Entry | 
| https://0patch.blogspot.com/2017/09/0patching-rsrc-arbitrary-null-write.html | Exploit Patch Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Information
                Published : 2017-09-05 11:29
Updated : 2022-04-19 12:15
NVD link : CVE-2017-2779
Mitre link : CVE-2017-2779
JSON object : View
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
Products Affected
                ni
- labview
 


