RULE(RULE ID:323010)

Rule General Information
Release Date: 2019-08-26
Rule Name: ABB PB610 Panel Builder 600 IDAL HTTP Host Stack Buffer Overflow Vulnerability -2 (CVE-2019-7232)
Severity:
CVE ID:
Rule Protection Details
Description: The ABB IDAL HTTP server is vulnerable to a buffer overflow when a long Host header is sent in a web request. The Host header value overflows a buffer and overwrites a Structured Exception Handler (SEH) address. An unauthenticated attacker can submit a Host header value of 2047 bytes or more to overflow the buffer and overwrite the SEH address, which can then be leveraged to execute attacker-controlled code on the server.
Impact: A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service.
Affected OS: Windows, Others
Reference: SecurityFocusBID:108886
http://packetstormsecurity.com/files/153403/ABB-IDAL-HTTP-Server-Stack-Based-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2019/Jun/40
https://search.abb.com/library/Download.aspx?DocumentID=3ADR010377&LanguageCode=en&DocumentPartId=&Action=Launch
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://library.e.abb.com/public/b0021d2ab9ba4e3ab14d7c2796f5908e/ABB-Advisory_3ADR010377_2.pdf