|
|||
Rule General Information |
---|
Release Date: | 2019-08-26 | |
Rule Name: | ABB PB610 Panel Builder 600 IDAL HTTP Host Stack Buffer Overflow Vulnerability -2 (CVE-2019-7232) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | The ABB IDAL HTTP server is vulnerable to a buffer overflow when a long Host header is sent in a web request. The Host header value overflows a buffer and overwrites a Structured Exception Handler (SEH) address. An unauthenticated attacker can submit a Host header value of 2047 bytes or more to overflow the buffer and overwrite the SEH address, which can then be leveraged to execute attacker-controlled code on the server. | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service. | |
Affected OS: | Windows, Others | |
Reference: | SecurityFocusBID:108886 http://packetstormsecurity.com/files/153403/ABB-IDAL-HTTP-Server-Stack-Based-Buffer-Overflow.html http://seclists.org/fulldisclosure/2019/Jun/40 https://search.abb.com/library/Download.aspx?DocumentID=3ADR010377&LanguageCode=en&DocumentPartId=&Action=Launch |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://library.e.abb.com/public/b0021d2ab9ba4e3ab14d7c2796f5908e/ABB-Advisory_3ADR010377_2.pdf |