ID

VAR-201601-0061


CVE

CVE-2015-7939


TITLE

Unitronics VisiLogic OPLC IDE Heap-based buffer overflow vulnerability

Trust: 1.4

sources: JVNDB: JVNDB-2015-006779 // CNNVD: CNNVD-201601-121

DESCRIPTION

Heap-based buffer overflow in Unitronics VisiLogic OPLC IDE before 9.8.09 allows remote attackers to execute arbitrary code via a long vlp filename. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within parsing of vlp files. A specially crafted vlp will overrun a heap buffer and inject values past the end of the heap allocation. An attacker can leverage this vulnerability to execute arbitrary code under the context of local Administrator. Unitronics VisiLogic OPLC IDE is a set of human machine interface (HMI) and PLC application programming environments for Vision and SAMBA series controllers from Unitronics, Israel. Failed exploit attempts will likely result in denial-of-service conditions. Unitronics VisiLogic OPLC IDE 9.8.0.00 and prior versions are vulnerable

Trust: 3.24

sources: NVD: CVE-2015-7939 // JVNDB: JVNDB-2015-006779 // ZDI: ZDI-16-001 // CNVD: CNVD-2016-00142 // BID: 79897 // IVD: 661d78c0-2351-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 661d78c0-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-00142

AFFECTED PRODUCTS

vendor:unitronicsmodel:visilogic oplc idescope: - version: -

Trust: 1.3

vendor:unitronicsmodel:visilogic oplc idescope:lteversion:9.8.0.00

Trust: 1.0

vendor:unitronicsmodel:visilogic oplc idescope:ltversion:9.8.09

Trust: 0.8

vendor:unitronicsmodel:visilogic oplc idescope:eqversion:9.8.0.00

Trust: 0.6

vendor:unitronicsmodel:visilogicscope:eqversion:9.8.0.00

Trust: 0.3

vendor:unitronicsmodel:visilogicscope:neversion:9.8.9

Trust: 0.3

vendor:visilogic oplc idemodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 661d78c0-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-16-001 // CNVD: CNVD-2016-00142 // BID: 79897 // JVNDB: JVNDB-2015-006779 // CNNVD: CNNVD-201601-121 // NVD: CVE-2015-7939

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-7939
value: CRITICAL

Trust: 1.0

NVD: CVE-2015-7939
value: HIGH

Trust: 0.8

ZDI: CVE-2015-7939
value: HIGH

Trust: 0.7

CNVD: CNVD-2016-00142
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201601-121
value: CRITICAL

Trust: 0.6

IVD: 661d78c0-2351-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2015-7939
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.5

CNVD: CNVD-2016-00142
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 661d78c0-2351-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2015-7939
baseSeverity: CRITICAL
baseScore: 9.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 6.0
version: 3.0

Trust: 1.0

sources: IVD: 661d78c0-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-16-001 // CNVD: CNVD-2016-00142 // JVNDB: JVNDB-2015-006779 // CNNVD: CNNVD-201601-121 // NVD: CVE-2015-7939

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2015-006779 // NVD: CVE-2015-7939

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201601-121

TYPE

Buffer overflow

Trust: 0.8

sources: IVD: 661d78c0-2351-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201601-121

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006779

PATCH

title:Download - VisiLogic (Vision Series)url:http://www.unitronics.com/support/downloads

Trust: 0.8

title:Unitronics has issued an update to correct this vulnerability.url:https://ics-cert.us-cert.gov/advisories/ICSA-15-274-02A

Trust: 0.7

title:Patch for Unitronics VisiLogic OPLC IDE Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/69723

Trust: 0.6

title:Unitronics VisiLogic OPLC IDE Fixes for heap-based buffer overflow vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59477

Trust: 0.6

sources: ZDI: ZDI-16-001 // CNVD: CNVD-2016-00142 // JVNDB: JVNDB-2015-006779 // CNNVD: CNNVD-201601-121

EXTERNAL IDS

db:NVDid:CVE-2015-7939

Trust: 4.2

db:ZDIid:ZDI-16-001

Trust: 3.2

db:ICS CERTid:ICSA-15-274-02A

Trust: 2.4

db:CNVDid:CNVD-2016-00142

Trust: 0.8

db:CNNVDid:CNNVD-201601-121

Trust: 0.8

db:JVNDBid:JVNDB-2015-006779

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-2905

Trust: 0.7

db:BIDid:79897

Trust: 0.3

db:IVDid:661D78C0-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: 661d78c0-2351-11e6-abef-000c29c66e3d // ZDI: ZDI-16-001 // CNVD: CNVD-2016-00142 // BID: 79897 // JVNDB: JVNDB-2015-006779 // CNNVD: CNNVD-201601-121 // NVD: CVE-2015-7939

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-15-274-02a

Trust: 3.1

url:http://www.zerodayinitiative.com/advisories/zdi-16-001

Trust: 2.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7939

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7939

Trust: 0.8

url:http://www.unitronics.com/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-16-001/

Trust: 0.3

sources: ZDI: ZDI-16-001 // CNVD: CNVD-2016-00142 // BID: 79897 // JVNDB: JVNDB-2015-006779 // CNNVD: CNNVD-201601-121 // NVD: CVE-2015-7939

CREDITS

Steven Seeley of Source Incite

Trust: 1.6

sources: ZDI: ZDI-16-001 // BID: 79897 // CNNVD: CNNVD-201601-121

SOURCES

db:IVDid:661d78c0-2351-11e6-abef-000c29c66e3d
db:ZDIid:ZDI-16-001
db:CNVDid:CNVD-2016-00142
db:BIDid:79897
db:JVNDBid:JVNDB-2015-006779
db:CNNVDid:CNNVD-201601-121
db:NVDid:CVE-2015-7939

LAST UPDATE DATE

2024-08-14T15:34:54.870000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-16-001date:2016-01-06T00:00:00
db:CNVDid:CNVD-2016-00142date:2016-01-11T00:00:00
db:BIDid:79897date:2016-01-06T00:00:00
db:JVNDBid:JVNDB-2015-006779date:2016-01-19T00:00:00
db:CNNVDid:CNNVD-201601-121date:2016-01-11T00:00:00
db:NVDid:CVE-2015-7939date:2016-01-18T13:12:06.010

SOURCES RELEASE DATE

db:IVDid:661d78c0-2351-11e6-abef-000c29c66e3ddate:2016-01-11T00:00:00
db:ZDIid:ZDI-16-001date:2016-01-06T00:00:00
db:CNVDid:CNVD-2016-00142date:2016-01-11T00:00:00
db:BIDid:79897date:2016-01-06T00:00:00
db:JVNDBid:JVNDB-2015-006779date:2016-01-19T00:00:00
db:CNNVDid:CNNVD-201601-121date:2016-01-07T00:00:00
db:NVDid:CVE-2015-7939date:2016-01-09T02:59:12.893