Advisory Details

September 12th, 2018

Fuji Electric V-Server VPR File Parsing CArchive Read Untrusted Pointer Dereference Remote Code Execution Vulnerability

ZDI-18-1021
ZDI-CAN-5887

CVE ID CVE-2018-14811
CVSS SCORE 6.8, AV:N/AC:M/Au:N/C:P/I:P/A:P
AFFECTED VENDORS Fuji Electric
AFFECTED PRODUCTS V-Server
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Fuji Electric V-Server. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of a VPR file. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code under the context of the V-Server process.

ADDITIONAL DETAILS Fuji Electric has issued an update to correct this vulnerability. More details can be found at:
https://ics-cert.us-cert.gov/advisories/ICSA-18-254-01
DISCLOSURE TIMELINE
  • 2018-03-21 - Vulnerability reported to vendor
  • 2018-09-12 - Coordinated public release of advisory
  • 2018-09-12 - Advisory Updated
CREDIT Steven Seeley (mr_me) of Source Incite
BACK TO ADVISORIES