ID

VAR-201204-0126


CVE

CVE-2012-1801


TITLE

plural ABB Product stack-based buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2012-002095

DESCRIPTION

Multiple stack-based buffer overflows in (1) COM and (2) ActiveX controls in ABB WebWare Server, WebWare SDK, Interlink Module, S4 OPC Server, QuickTeach, RobotStudio S4, and RobotStudio Lite allow remote attackers to execute arbitrary code via crafted input data. ABB is a leader in power and automation technology among the world's top 500 companies. ABB's multiple products include COM and ActiveX controls that do not adequately check user input data, and an attacker builds a malicious WEB page, convincing the user to parse, spilling the stack pointer or causing control to stop. Multiple ABB products are prone to a remote buffer-overflow vulnerability because they fail to perform adequate boundary checks on user-supplied data. Attackers can exploit this issue to execute arbitrary code within the context of the application using the vulnerable control (typically Internet Explorer). ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: ABB Multiple Products ActiveX Control Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA48693 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48693/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48693 RELEASE DATE: 2012-04-05 DISCUSS ADVISORY: http://secunia.com/advisories/48693/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48693/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48693 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in various ABB products, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an error in an unspecified ActiveX control and can be exploited to cause a stack-based buffer overflow. Successful exploitation may allow execution of arbitrary code. Instead, set the kill-bit for the affected ActiveX control (contact the vendor for more information). PROVIDED AND/OR DISCOVERED BY: Terry McCorkle and Billy Rios ORIGINAL ADVISORY: ABB-VU-DMRO-41532: http://www.abb.com/global/scot/scot348.nsf/veritydisplay/35df9dc4a94ae83ac12579ca0043acc1/$file/SI10231A2%20rev%200.pdf ICSA-12-095-01: http://www.us-cert.gov/control_systems/pdf/ICSA-12-095-01.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2012-1801 // JVNDB: JVNDB-2012-002095 // CNVD: CNVD-2012-1780 // BID: 52888 // IVD: f0e62f68-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-55082 // PACKETSTORM: 111606

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: f0e62f68-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1780

AFFECTED PRODUCTS

vendor:abbmodel:s4 opc serverscope:eqversion: -

Trust: 1.6

vendor:abbmodel:interlink modulescope:eqversion: -

Trust: 1.6

vendor:abbmodel:robotstudio litescope:eqversion: -

Trust: 1.6

vendor:abbmodel:robotstudio s4scope:eqversion: -

Trust: 1.6

vendor:abbmodel:quickteachscope:eqversion: -

Trust: 1.6

vendor:abbmodel:webware sdkscope:eqversion: -

Trust: 1.6

vendor:abbmodel:webware serverscope:eqversion: -

Trust: 1.6

vendor:abbmodel:s4 opc serverscope: - version: -

Trust: 1.4

vendor:abbmodel:quickteachscope: - version: -

Trust: 1.4

vendor:abbmodel:webware serverscope:eqversion:4.0

Trust: 0.9

vendor:abbmodel:webware serverscope:eqversion:4.6

Trust: 0.9

vendor:abbmodel:webware serverscope:eqversion:4.91

Trust: 0.9

vendor:abbmodel:webware sdkscope:eqversion:4.6

Trust: 0.9

vendor:abbmodel:webware sdkscope:eqversion:4.9

Trust: 0.9

vendor:abbmodel:robotstudio s4scope:eqversion:0

Trust: 0.9

vendor:abbmodel:robotstudio litescope:eqversion:0

Trust: 0.9

vendor:abbmodel:robotstudioscope:eqversion:5.14.01

Trust: 0.9

vendor:abbmodel:robotstudioscope:eqversion:5.14.02

Trust: 0.9

vendor:abbmodel:interlink modulescope:eqversion:4.6

Trust: 0.9

vendor:abbmodel:interlink modulescope:eqversion:4.9

Trust: 0.9

vendor:abbmodel:interlink modulescope: - version: -

Trust: 0.8

vendor:abbmodel:robotstudio litescope: - version: -

Trust: 0.8

vendor:abbmodel:robotstudio s4scope: - version: -

Trust: 0.8

vendor:abbmodel:webware sdkscope: - version: -

Trust: 0.8

vendor:abbmodel:webware serverscope: - version: -

Trust: 0.8

vendor:abbmodel:webware serverscope:eqversion:0

Trust: 0.3

vendor:abbmodel:webware sdkscope:eqversion:0

Trust: 0.3

vendor:abbmodel:s4 opc serverscope:eqversion:0

Trust: 0.3

vendor:abbmodel:quickteachscope:eqversion:0

Trust: 0.3

vendor:abbmodel:interlink modulescope:eqversion:0

Trust: 0.3

vendor:interlink modulemodel: - scope:eqversion: -

Trust: 0.2

vendor:quickteachmodel: - scope:eqversion: -

Trust: 0.2

vendor:robotstudio litemodel: - scope:eqversion: -

Trust: 0.2

vendor:robotstudio s4model: - scope:eqversion: -

Trust: 0.2

vendor:s4 opc servermodel: - scope:eqversion: -

Trust: 0.2

vendor:webware sdkmodel: - scope:eqversion: -

Trust: 0.2

vendor:webware servermodel: - scope:eqversion: -

Trust: 0.2

sources: IVD: f0e62f68-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1780 // BID: 52888 // JVNDB: JVNDB-2012-002095 // CNNVD: CNNVD-201204-021 // NVD: CVE-2012-1801

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-1801
value: HIGH

Trust: 1.0

NVD: CVE-2012-1801
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201204-021
value: HIGH

Trust: 0.6

IVD: f0e62f68-2353-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

VULHUB: VHN-55082
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-1801
severity: HIGH
baseScore: 7.7
vectorString: AV:A/AC:L/AU:S/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 5.1
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: f0e62f68-2353-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.7
vectorString: AV:A/AC:L/AU:S/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 5.1
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-55082
severity: HIGH
baseScore: 7.7
vectorString: AV:A/AC:L/AU:S/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 5.1
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: f0e62f68-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-55082 // JVNDB: JVNDB-2012-002095 // CNNVD: CNNVD-201204-021 // NVD: CVE-2012-1801

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-55082 // JVNDB: JVNDB-2012-002095 // NVD: CVE-2012-1801

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201204-021

TYPE

Buffer overflow

Trust: 0.8

sources: IVD: f0e62f68-2353-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201204-021

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002095

PATCH

title:ABB-VU-DMRO-41532url:http://www05.abb.com/global/scot/scot348.nsf/veritydisplay/35df9dc4a94ae83ac12579ca0043acc1/$file/SI10231A2%20rev%200.pdf

Trust: 0.8

title:Top Pageurl:http://www.abb.com/

Trust: 0.8

sources: JVNDB: JVNDB-2012-002095

EXTERNAL IDS

db:NVDid:CVE-2012-1801

Trust: 3.6

db:ICS CERTid:ICSA-12-095-01A

Trust: 2.5

db:BIDid:52888

Trust: 2.0

db:SECUNIAid:48693

Trust: 1.9

db:ICS CERTid:ICSA-12-095-01

Trust: 1.0

db:CNNVDid:CNNVD-201204-021

Trust: 0.9

db:CNVDid:CNVD-2012-1780

Trust: 0.8

db:JVNDBid:JVNDB-2012-002095

Trust: 0.8

db:NSFOCUSid:19296

Trust: 0.6

db:IVDid:F0E62F68-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-55082

Trust: 0.1

db:PACKETSTORMid:111606

Trust: 0.1

sources: IVD: f0e62f68-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1780 // VULHUB: VHN-55082 // BID: 52888 // JVNDB: JVNDB-2012-002095 // PACKETSTORM: 111606 // CNNVD: CNNVD-201204-021 // NVD: CVE-2012-1801

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-095-01a.pdf

Trust: 2.5

url:http://www.securityfocus.com/bid/52888

Trust: 1.7

url:http://secunia.com/advisories/48693

Trust: 1.7

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-095-01.pdf

Trust: 1.0

url:http://www05.abb.com/global/scot/scot348.nsf/veritydisplay/35df9dc4a94ae83ac12579ca0043acc1/%24file/si10231a2%20rev%200.pdf

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1801

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1801

Trust: 0.8

url:http://www05.abb.com/global/scot/scot348.nsf/veritydisplay/35df9dc4a94ae83ac12579ca0043acc1/$file/si10231a2%20rev%200.pdf

Trust: 0.7

url:http://www.nsfocus.net/vulndb/19296

Trust: 0.6

url:http://www.abb.com/

Trust: 0.3

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48693

Trust: 0.1

url:http://secunia.com/advisories/48693/

Trust: 0.1

url:http://secunia.com/advisories/48693/#comments

Trust: 0.1

url:http://www.abb.com/global/scot/scot348.nsf/veritydisplay/35df9dc4a94ae83ac12579ca0043acc1/$file/si10231a2%20rev%200.pdf

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-1780 // VULHUB: VHN-55082 // BID: 52888 // JVNDB: JVNDB-2012-002095 // PACKETSTORM: 111606 // CNNVD: CNNVD-201204-021 // NVD: CVE-2012-1801

CREDITS

Terry McCorkle and Billy Rios

Trust: 0.9

sources: BID: 52888 // CNNVD: CNNVD-201204-021

SOURCES

db:IVDid:f0e62f68-2353-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-1780
db:VULHUBid:VHN-55082
db:BIDid:52888
db:JVNDBid:JVNDB-2012-002095
db:PACKETSTORMid:111606
db:CNNVDid:CNNVD-201204-021
db:NVDid:CVE-2012-1801

LAST UPDATE DATE

2025-04-11T23:18:58.136000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-1780date:2012-04-09T00:00:00
db:VULHUBid:VHN-55082date:2017-12-20T00:00:00
db:BIDid:52888date:2012-04-04T00:00:00
db:JVNDBid:JVNDB-2012-002095date:2012-04-19T00:00:00
db:CNNVDid:CNNVD-201204-021date:2012-04-10T00:00:00
db:NVDid:CVE-2012-1801date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:f0e62f68-2353-11e6-abef-000c29c66e3ddate:2012-04-09T00:00:00
db:CNVDid:CNVD-2012-1780date:2012-04-09T00:00:00
db:VULHUBid:VHN-55082date:2012-04-18T00:00:00
db:BIDid:52888date:2012-04-04T00:00:00
db:JVNDBid:JVNDB-2012-002095date:2012-04-19T00:00:00
db:PACKETSTORMid:111606date:2012-04-05T05:30:16
db:CNNVDid:CNNVD-201204-021date:2012-04-06T00:00:00
db:NVDid:CVE-2012-1801date:2012-04-18T10:33:35.417