Unitronics UniDownloader and Unitronics VisiLogic OPLC IDE IPWorksSSL.HTTPS.1 ActiveX Control WinSockPath Property Remote Code Execution VulnerabilityZDI-15-574: December 2nd, 2015
VisiLogic OPLC IDE
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Unitronics UniDownloader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within implementation of the WinSockPath property of the HTTPS ActiveX control. The control passes this property as the URL for a DLL to the LoadLibraryA API, which will automatically execute DllMain in the DLL. This can be leveraged by an attacker for remote code execution in the context of the process.
Vendor ResponseUnitronics has issued an update to correct this vulnerability. More details can be found at:
2015-05-28 - Vulnerability reported to vendor
2015-12-02 - Coordinated public release of advisory
CreditThis vulnerability was discovered by:
Andrea Micalizzi (rgod)