ID CVE-2019-7232
Summary The ABB IDAL HTTP server is vulnerable to a buffer overflow when a long Host header is sent in a web request. The Host header value overflows a buffer and overwrites a Structured Exception Handler (SEH) address. An unauthenticated attacker can submit a Host header value of 2047 bytes or more to overflow the buffer and overwrite the SEH address, which can then be leveraged to execute attacker-controlled code on the server.
References
Vulnerable Configurations
  • cpe:2.3:o:abb:pb610_panel_builder_600_firmware:1.91:*:*:*:*:*:*:*
    cpe:2.3:o:abb:pb610_panel_builder_600_firmware:1.91:*:*:*:*:*:*:*
  • cpe:2.3:o:abb:pb610_panel_builder_600_firmware:2.8.0.367:*:*:*:*:*:*:*
    cpe:2.3:o:abb:pb610_panel_builder_600_firmware:2.8.0.367:*:*:*:*:*:*:*
  • cpe:2.3:h:abb:pb610_panel_builder_600:-:*:*:*:*:*:*:*
    cpe:2.3:h:abb:pb610_panel_builder_600:-:*:*:*:*:*:*:*
CVSS
Base: 5.8 (as of 30-11-2022 - 21:41)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
ADJACENT_NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:A/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 108886
confirm https://search.abb.com/library/Download.aspx?DocumentID=3ADR010377&LanguageCode=en&DocumentPartId=&Action=Launch
fulldisc 20190624 XL-19-011 - ABB IDAL HTTP Server Stack-Based Buffer Overflow Vulnerability
misc
Last major update 30-11-2022 - 21:41
Published 24-06-2019 - 17:15
Last modified 30-11-2022 - 21:41
Back to Top