CVE-2018-10616 – ABB Panel Builder ModBus Beckhoff ClockDevice Stack-based Buffer Overflow Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-10616
ABB Panel Builder 800 all versions has an improper input validation vulnerability which may allow an attacker to insert and run arbitrary code on a computer where the affected product is used. ABB Panel Builder 800 en todas sus versiones tiene una vulnerabilidad de validación de entradas incorrecta que podría permitir que un atacante inserte y ejecute código arbitrario en un ordenador en el que se emplea el producto afectado. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ABB Panel Builder 800. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the ClockDevice parameter of the ABB Modbus Beckhoff OPC Driver. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. • http://search-ext.abb.com/library/Download.aspx?DocumentID=3BSE092089&Action=Launch http://www.securityfocus.com/bid/104882 https://ics-cert.us-cert.gov/advisories/ICSA-18-198-01 • CWE-20: Improper Input Validation •
CVE-2016-2281
https://notcve.org/view.php?id=CVE-2016-2281
Untrusted search path vulnerability in ABB Panel Builder 800 5.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory. Vulnerabilidad de ruta de búsqueda no confiable en ABB Panel Builder 800 5.1 permite a usuarios locales obtener privilegios a través de un troyano DLL en el directorio de trabajo actual. • https://ics-cert.us-cert.gov/advisories/ICSA-16-077-01 • CWE-264: Permissions, Privileges, and Access Controls •