#VU19016 Stack-based buffer overflow


Published: 2019-07-04 | Updated: 2019-07-04

Vulnerability identifier: #VU19016

Vulnerability risk: Low

CVSSv3.1: 5.1 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-7231

CWE-ID: CWE-121

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
BSP UN31
Server applications / SCADA systems
BSP UN30
Server applications / SCADA systems
PB610 Panel Builder 600
Server applications / SCADA systems

Vendor: ABB

Description

The vulnerability allows an attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when a long string is sent to the IDAL FTP server. An authenticated attacker can send a FTP command string of 472 bytes or more to overflow a buffer, causing an exception that terminates the server.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

BSP UN31: All versions

BSP UN30: All versions

PB610 Panel Builder 600: 1.91 - 2.8.0.367


External links
http://search-ext.abb.com/library/Download.aspx?DocumentID=3ADR010377&LanguageCode=en&a...
http://www.us-cert.gov/ics/advisories/icsa-19-178-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability