CVE-2019-7232
ABB IDAL HTTP Server Stack-Based Buffer Overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
The ABB IDAL HTTP server is vulnerable to a buffer overflow when a long Host header is sent in a web request. The Host header value overflows a buffer and overwrites a Structured Exception Handler (SEH) address. An unauthenticated attacker can submit a Host header value of 2047 bytes or more to overflow the buffer and overwrite the SEH address, which can then be leveraged to execute attacker-controlled code on the server.
El servidor HTTP IDAL ABB, es vulnerable a un desbordamiento de búfer cuando se envía un encabezado Host largo en una petición web. El valor del encabezado Host desborda un búfer y sobrescribe una dirección Structured Exception Handler (SEH). Un atacante no autenticado puede enviar un valor de encabezado Host de 2047 bytes o más para desbordar el búfer y sobrescribir la dirección SEH, que después puede ser aprovechada para ejecutar un código controlado por el atacante sobre el servidor.
The IDAL HTTP server is vulnerable to a stack-based buffer overflow when receiving a large host header in a HTTP request. The host header value overflows a buffer and overwrites the Structured Exception Handler (SEH) address with a larger buffer. An unauthenticated attacker can send a Host header value of 2047 bytes or more to overflow the host headers and overwrite the SEH address which can then be leveraged to execute attacker controlled code on the server.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-01-30 CVE Reserved
- 2019-06-24 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2024-10-02 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/108886 | Third Party Advisory | |
https://www.darkmatter.ae/xen1thlabs/published-advisories | Third Party Advisory |
URL | Date | SRC |
---|---|---|
http://packetstormsecurity.com/files/153403/ABB-IDAL-HTTP-Server-Stack-Based-Buffer-Overflow.html | 2024-08-04 | |
http://seclists.org/fulldisclosure/2019/Jun/40 | 2024-08-04 |
URL | Date | SRC |
---|---|---|
https://search.abb.com/library/Download.aspx?DocumentID=3ADR010377&LanguageCode=en&DocumentPartId=&Action=Launch | 2022-11-30 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Abb Search vendor "Abb" | Pb610 Panel Builder 600 Firmware Search vendor "Abb" for product "Pb610 Panel Builder 600 Firmware" | >= 1.91 <= 2.8.0.367 Search vendor "Abb" for product "Pb610 Panel Builder 600 Firmware" and version " >= 1.91 <= 2.8.0.367" | - |
Affected
| in | Abb Search vendor "Abb" | Pb610 Panel Builder 600 Search vendor "Abb" for product "Pb610 Panel Builder 600" | - | - |
Safe
|