First published: Mon Jun 24 2019(Updated: )
The ABB IDAL HTTP server is vulnerable to a buffer overflow when a long Host header is sent in a web request. The Host header value overflows a buffer and overwrites a Structured Exception Handler (SEH) address. An unauthenticated attacker can submit a Host header value of 2047 bytes or more to overflow the buffer and overwrite the SEH address, which can then be leveraged to execute attacker-controlled code on the server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ABB PB610 Panel Builder 600 Firmware | >=1.91<=2.8.0.367 | |
ABB Panel Builder 600 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7232 is considered critical due to the potential for remote code execution via buffer overflow.
To fix CVE-2019-7232, you should upgrade to a revised version of the ABB Panel Builder 600 firmware that addresses this vulnerability.
CVE-2019-7232 affects users of ABB PB610 Panel Builder 600 Firmware versions between 1.91 and 2.8.0.367.
An attacker can exploit CVE-2019-7232 to perform a denial-of-service attack or potentially execute arbitrary code.
No, CVE-2019-7232 can be exploited by unauthenticated attackers, making it more dangerous.