Executive Summary

Summary
Title ABB PCU400 vulnerable to buffer overflow
Informations
Name VU#343971 First vendor Publication 2008-09-25
Vendor VU-CERT Last vendor Modification 2008-10-08
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#343971

ABB PCU400 vulnerable to buffer overflow

Overview

ABB PCU400 contains a vulnerability which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

I. Description

The ABB PCU400 application serves as a communication gateway between RTUs that use the IEC-870-5-104 protocol and the SCADA server. The diagnositc web application contains a software flaw which allows an attacker to gain full access on the PCU400 server by sending a specially crafted packet to the X87 web interface on TCP port 8087.

Note that this issue affects PCU400 installations running the IEC60870-5-101/104 protocol based on X87.

II. Impact

A remote attacker may be able to execute arbitrary code with the privileges of the account running the x87 application.

III. Solution

Upgrade or Patch


According to ABB:

    This issue is corrected in version 3.5.5 of the x87 executable. To obtain a patch or upgrade software please contactt your vendor. The x87 executable is considered obsolete in newer versions of the PCU 400 and should be replaced by the newer x88 or x89 executable where applicable.

Restrict Access

This diagnostic web application is designed to be used locally. Restrictions should be put in place to limit remote access. According to ABB:
    Unless there is a specific reason, a host based filter like the built-in firewall in Windows XP should be activated for the port 8087, denying access to the web interface from a remote location.

    Systems Affected

    VendorStatusDate NotifiedDate Updated
    ABBVulnerable2008-10-08

    References



http://www.digitalbond.com/wiki/index.php/ABB_PCU400_Remote_Buffer_Overflow
http://www.securityfocus.com/archive/1/496739/30/0/threaded

Credit

This issue was reported by Eyal Udassin and Idan Ofrat of C4 Security.

This document was written by Chris Taschner.

Other Information

Date Public:2008-09-25
Date First Published:2008-09-25
Date Last Updated:2008-10-08
CERT Advisory: 
CVE-ID(s):CVE-2008-2474
NVD-ID(s):CVE-2008-2474
US-CERT Technical Alerts: 
Metric:3.28
Document Revision:18

Original Source

Url : http://www.kb.cert.org/vuls/id/343971

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware 3

Open Source Vulnerability Database (OSVDB)

Id Description
48533 ABB PCU400 X87 Multiple IEC Protocol Handling Remote Overflow