Advisory Details

September 26th, 2018

(0Day) Wecon LeviStudioU cximageu TIFF Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

ZDI-18-1090
ZDI-CAN-6243

CVE ID CVE-2018-10610
CVSS SCORE 9.3, AV:N/AC:M/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Wecon
AFFECTED PRODUCTS LeviStudioU
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Wecon LeviStudioU. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of TIFF images. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code under the context of an administrator.

ADDITIONAL DETAILS Wecon has issued an update to correct this vulnerability. More details can be found at:
https://ics-cert.us-cert.gov/advisories/ICSA-18-212-03


This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120 day deadline.

05/18/18 - ZDI disclosed the reports to ICS-CERT
07/06/18 - ZDI inquired about the status of the reports
09/19/18 - ZDI notified ICS-CERT of the intent to 0-day these on 9/26

-- Mitigation:
Given the nature of the vulnerability the only salient mitigation strategy is to restrict interaction with the application to trusted files.


DISCLOSURE TIMELINE
  • 2018-05-18 - Vulnerability reported to vendor
  • 2018-09-26 - Coordinated public release of advisory
  • 2018-09-26 - Advisory Updated
CREDIT Mat Powell - Trend Micro Zero Day Initiative
BACK TO ADVISORIES