TippingPoint Zero Day Initiative
 

(0Day) Delta Industrial Automation WPLSoft File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability

ZDI-17-698: August 24th, 2017

CVSS Score

Affected Vendors

Affected Products

    WPLSoft

Vulnerability Details


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation WPLSoft and Delta Industrial Automation ISPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the processing of dvp files. The process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of current process.

Vendor Response

Delta Industrial Automation states:


This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120 day deadline.

02/01/17 - ZDI disclosed reports to ICS-CERT
02/07/17 - ICS-CERT provided ZDI with an ICS-VU # ICS-VU-974568
03/16/17 - ICS-CERT asked ZDI questions about reproduction
03/27/17 - ICS-CERT asked ZDI again some questions about reproduction
06/07/17 - ICS-CERT offered ZDI a pre-release patch to test
06/07/17 - ZDI replied that we cannot do the testing for the vendor
07/20/17 - ZDI sent a mail to ICS-CERT asking the status
07/26/17 - ICS-CERT advised that the vendor has a new version they believe addressed the reports (though to ZDI knowledge, no advisory was released)
08/02/17 - ZDI advised ICS-CERT that our finder indicated that the vulnerabilities are still present
08/11/17 - ZDI wrote ICS-CERT to indicate the intention to move these reports to 0-day on 8/24

-- Mitigation:
Given the nature of the vulnerability the only salient mitigation strategy is to restrict interaction with the application to trusted files.


Disclosure Timeline

    2016-08-25 - Vulnerability reported to vendor
    2017-08-24 - Coordinated public release of advisory

Credit

This vulnerability was discovered by:
    axt