Unitronics UniDownloader and Unitronics VisiLogic OPLC IDE IPWorksSSL.HTTPS.1 ActiveX Control PostDataB/FirewallDataB Properties Remote Code Execution VulnerabilityZDI-15-576: December 2nd, 2015
VisiLogic OPLC IDE
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Unitronics UniDownloader and Unitronics VisiLogic OPLC IDE. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within processing of the PostDataB and FirewallDataB properties of the IPWorksSSL.HTTPS.1 ActiveX control. Both properties take a value from the script and treat it as the address of a SafeArray and then process information from the SafeArray structure. An attacker can leverage this type confusion to execute arbitrary code under the context of the process.
Vendor ResponseUnitronics has issued an update to correct this vulnerability. More details can be found at:
2015-05-28 - Vulnerability reported to vendor
2015-12-02 - Coordinated public release of advisory
CreditThis vulnerability was discovered by:
Andrea Micalizzi (rgod)