ID

VAR-200809-0017


CVE

CVE-2008-2474


TITLE

ABB PCU400 "x87" Buffer Overflow Vulnerability

Trust: 0.8

sources: IVD: 35bf607c-23cd-11e6-abef-000c29c66e3d // CNNVD: CNNVD-200809-397

DESCRIPTION

Buffer overflow in x87 before 3.5.5 in ABB Process Communication Unit 400 (PCU400) 4.4 through 4.6 allows remote attackers to execute arbitrary code via a crafted packet using the (1) IEC60870-5-101 or (2) IEC60870-5-104 communication protocol to the X87 web interface. ABB PCU400 contains a vulnerability which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. ABB Made by company PCU400 Contains a buffer overflow vulnerability. ABB Provided by the company PCU400 Application server IEC-870-5-104 Use protocol RTU(Remote Terminal Unit) When SCADA A gateway device that communicates between servers. The PCU400 'x87' executable version 3.5.5 is vulnerable; other versions may also be affected. Background ----------------- Vendor product information: PCU400 is the modern product when implementing an effective data acquisition network in SCADA-based systems PCU400, Process Communication Unit 400 forms the communication interface to the network of remote terminal units (RTUs) together with the RCS Application Software located in the application server of a Network Manager SCADA system. The PCU400 can be used as a SCADA front-end, communication gateway for Substation Automation systems or as a standalone protocol converter. Two parts define the Data Acquisition system: * RCS Application, a software package running in the Application Server * PCU400, a front-end converter that implements the protocols and connects the physical lines PCU 400 can be used in a variety of configurations to cater for different network topologies and different levels of fault tolerance in the system. The alternatives include single or redundant PCU 400 units. Description ---------------- A buffer overflow exists in the component that handles IEC60870-5-101 and IEC60870-5-104 communication protocols. The description of the vulnerability is intentionally limited as this software controls critical national infrastructure. Impact ---------- An attacker can compromise the server which runs PCU400, which acts as the FEP server of the ABB SCADA system. This vulnerability is another method to carry out the "field to control center" attack vector mentioned in C4's S4 2008 paper "Control System Attack Vectors and Examples: Field Site and Corporate Network", which will allow the attacker to control other RTUs connected to that FEP. In addition, an attacker can use his control over the FEP server to insert a generic electric grid malware as specified in our SysScan08 presentation, in order to cause harm to the grid. Both documents are available at http://www.c4-security.com/index-5.html . Workaround/Fix ----------------------- The vendor issued a hotfix to resolve this vulnerability. Additional Information ------------------------------- For additional information please contact us at info_at_c4-security.com. Note that we will respond only to verified utility personnel and governmental agencies. The CVE identifier assigned to this vulnerability by CERT is CVE-2008-2474 Credit -------- This vulnerability was discovered and exploited by Idan Ofrat of C4. ---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: ABB PCU400 X87 Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA32047 VERIFY ADVISORY: http://secunia.com/advisories/32047/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From local network SOFTWARE: ABB PCU 400 http://secunia.com/advisories/product/19970/ DESCRIPTION: A vulnerability has been reported in ABB PCU400, which can potentially be exploited by malicious people to compromise a vulnerable system. PROVIDED AND/OR DISCOVERED BY: Idan Ofrat of C4 Security ORIGINAL ADVISORY: C4 Security: http://archives.neohapsis.com/archives/bugtraq/2008-09/0283.html OTHER REFERENCES: US-CERT VU#343971: http://www.kb.cert.org/vuls/id/343971 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.06

sources: NVD: CVE-2008-2474 // CERT/CC: VU#343971 // JVNDB: JVNDB-2008-001777 // BID: 31391 // IVD: 35bf607c-23cd-11e6-abef-000c29c66e3d // VULHUB: VHN-32599 // PACKETSTORM: 70351 // PACKETSTORM: 70382

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: 35bf607c-23cd-11e6-abef-000c29c66e3d

AFFECTED PRODUCTS

vendor:abbmodel:pcu400scope:eqversion:4.6

Trust: 1.9

vendor:abbmodel:pcu400scope:eqversion:4.5

Trust: 1.9

vendor:abbmodel:pcu400scope:eqversion:4.4

Trust: 1.9

vendor:abbmodel: - scope: - version: -

Trust: 0.8

vendor:abbmodel:pcu400scope:eqversion:4.4 to 4.6

Trust: 0.8

vendor:pcu400model: - scope:eqversion:4.4

Trust: 0.2

vendor:pcu400model: - scope:eqversion:4.5

Trust: 0.2

vendor:pcu400model: - scope:eqversion:4.6

Trust: 0.2

sources: IVD: 35bf607c-23cd-11e6-abef-000c29c66e3d // CERT/CC: VU#343971 // BID: 31391 // JVNDB: JVNDB-2008-001777 // CNNVD: CNNVD-200809-397 // NVD: CVE-2008-2474

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-2474
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#343971
value: 3.28

Trust: 0.8

NVD: CVE-2008-2474
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200809-397
value: CRITICAL

Trust: 0.6

IVD: 35bf607c-23cd-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

VULHUB: VHN-32599
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-2474
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: 35bf607c-23cd-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-32599
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 35bf607c-23cd-11e6-abef-000c29c66e3d // CERT/CC: VU#343971 // VULHUB: VHN-32599 // JVNDB: JVNDB-2008-001777 // CNNVD: CNNVD-200809-397 // NVD: CVE-2008-2474

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-32599 // JVNDB: JVNDB-2008-001777 // NVD: CVE-2008-2474

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200809-397

TYPE

Buffer overflow

Trust: 0.8

sources: IVD: 35bf607c-23cd-11e6-abef-000c29c66e3d // CNNVD: CNNVD-200809-397

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001777

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-32599

PATCH

title:Top Pageurl:http://www.abb.com/

Trust: 0.8

title:PCU400url:http://www.abb.com/industries/db0003db004333/c12573e7003305cbc1257074003d0702.aspx

Trust: 0.8

sources: JVNDB: JVNDB-2008-001777

EXTERNAL IDS

db:CERT/CCid:VU#343971

Trust: 3.7

db:NVDid:CVE-2008-2474

Trust: 3.1

db:BIDid:31391

Trust: 2.8

db:SECUNIAid:32047

Trust: 1.9

db:SREASONid:4320

Trust: 1.7

db:CNNVDid:CNNVD-200809-397

Trust: 0.8

db:JVNDBid:JVNDB-2008-001777

Trust: 0.8

db:BUGTRAQid:20080925 C4 SECURITY ADVISORY - ABB PCU400 4.4-4.6 REMOTE BUFFER OVERFLOW

Trust: 0.6

db:IVDid:35BF607C-23CD-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:70351

Trust: 0.2

db:VULHUBid:VHN-32599

Trust: 0.1

db:PACKETSTORMid:70382

Trust: 0.1

sources: IVD: 35bf607c-23cd-11e6-abef-000c29c66e3d // CERT/CC: VU#343971 // VULHUB: VHN-32599 // BID: 31391 // JVNDB: JVNDB-2008-001777 // PACKETSTORM: 70351 // PACKETSTORM: 70382 // CNNVD: CNNVD-200809-397 // NVD: CVE-2008-2474

REFERENCES

url:http://www.kb.cert.org/vuls/id/343971

Trust: 2.9

url:http://www.securityfocus.com/bid/31391

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/ctar-7jtnrx

Trust: 1.7

url:http://secunia.com/advisories/32047

Trust: 1.7

url:http://securityreason.com/securityalert/4320

Trust: 1.7

url:http://www.securityfocus.com/archive/1/496739/100/0/threaded

Trust: 1.1

url:http://www.digitalbond.com/wiki/index.php/abb_pcu400_remote_buffer_overflow

Trust: 0.8

url:http://www.securityfocus.com/archive/1/496739/30/0/threaded

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2474

Trust: 0.8

url:http://jvn.jp/cert/jvnvu343971/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-2474

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/496739/100/0/threaded

Trust: 0.6

url:http://www.abb.com/industries/db0003db004333/c12573e7003305cbc1257074003d0702.aspx?productlanguage=us&country=us

Trust: 0.3

url:/archive/1/496739

Trust: 0.3

url:http://www.c4-security.com/index-5.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2474

Trust: 0.1

url:http://secunia.com/binary_analysis/sample_analysis/

Trust: 0.1

url:http://secunia.com/advisories/32047/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/product/19970/

Trust: 0.1

url:http://archives.neohapsis.com/archives/bugtraq/2008-09/0283.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#343971 // VULHUB: VHN-32599 // BID: 31391 // JVNDB: JVNDB-2008-001777 // PACKETSTORM: 70351 // PACKETSTORM: 70382 // CNNVD: CNNVD-200809-397 // NVD: CVE-2008-2474

CREDITS

Eyal Udassin and Idan Ofrat of C4 Security

Trust: 0.9

sources: BID: 31391 // CNNVD: CNNVD-200809-397

SOURCES

db:IVDid:35bf607c-23cd-11e6-abef-000c29c66e3d
db:CERT/CCid:VU#343971
db:VULHUBid:VHN-32599
db:BIDid:31391
db:JVNDBid:JVNDB-2008-001777
db:PACKETSTORMid:70351
db:PACKETSTORMid:70382
db:CNNVDid:CNNVD-200809-397
db:NVDid:CVE-2008-2474

LAST UPDATE DATE

2025-04-10T23:24:56.412000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#343971date:2009-03-03T00:00:00
db:VULHUBid:VHN-32599date:2018-10-11T00:00:00
db:BIDid:31391date:2008-09-26T17:39:00
db:JVNDBid:JVNDB-2008-001777date:2008-10-28T00:00:00
db:CNNVDid:CNNVD-200809-397date:2009-02-12T00:00:00
db:NVDid:CVE-2008-2474date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:IVDid:35bf607c-23cd-11e6-abef-000c29c66e3ddate:2008-09-29T00:00:00
db:CERT/CCid:VU#343971date:2008-09-25T00:00:00
db:VULHUBid:VHN-32599date:2008-09-29T00:00:00
db:BIDid:31391date:2008-09-25T00:00:00
db:JVNDBid:JVNDB-2008-001777date:2008-10-28T00:00:00
db:PACKETSTORMid:70351date:2008-09-25T23:12:37
db:PACKETSTORMid:70382date:2008-09-27T00:07:21
db:CNNVDid:CNNVD-200809-397date:2008-09-29T00:00:00
db:NVDid:CVE-2008-2474date:2008-09-29T17:17:29.050