Fortinet Discovers UltraEdit DLL Preloading Vulnerability
Fortinet's FortiGuard Labs has discovered a DLL preloading vulnerability in IDM Computer Solutions' UltraEdit.
UltraEdit is a commercial text editor for Windows, Linux and OS X. The editor contains tools for programmers, including macros, configurable syntax highlighting, code folding, file type conversions, project management, regular expressions for search-and-replace, a column-edit mode, remote editing of files via FTP, interfaces for APIs or command lines of choice, etc and it also supports Unicode and hex editing mode.
UltraEdit for Windows is susceptible to a DLL preloading vulnerability. The issue occurs when the application looks to load a DLL for execution and an attacker provides a malicious DLL to use instead. The application generally follows a specific search path to locate the DLL. The vulnerability can be exploited by a simple file write (or potentially an over-write) which results in a foreign DLL running under the context of the application.
Users should apply the solution provided by IDM Computer Solutions.
Fortinet reported the vulnerability to IDM Computer Solutions on June 6, 2017.
IDM Computer Solutions confirmed the vulnerability on July 10, 2017.
IDM Computer Solutions patched the vulnerability on July 31, 2017.
This vulnerability was discovered by Kushal Arvind Shah of Fortinet's FortiGuard Labs.