Lucene search

K
zdiFritz Sands - HP Zero Day InitiativeZDI-15-631
HistoryDec 08, 2015 - 12:00 a.m.

Schneider Electric ProClima F1BookView ActiveX Control DefinedNameLocal Method Remote Code Execution Vulnerability

2015-12-0800:00:00
Fritz Sands - HP Zero Day Initiative
www.zerodayinitiative.com
11

0.443 Medium

EPSS

Percentile

97.4%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric ProClima. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the implementation of the DefinedNameLocal method of the F1BookView control. Memory corruption occurs when a long user-supplied name is supplied. Later in processing, the code jumps to an address outside of normal flow. An attacker could leverage this flaw to execute code under the context of the process.

0.443 Medium

EPSS

Percentile

97.4%