Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cg5v-gm33-jwmv

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.8

Описание

The ABB IDAL HTTP server is vulnerable to a buffer overflow when a long Host header is sent in a web request. The Host header value overflows a buffer and overwrites a Structured Exception Handler (SEH) address. An unauthenticated attacker can submit a Host header value of 2047 bytes or more to overflow the buffer and overwrite the SEH address, which can then be leveraged to execute attacker-controlled code on the server.

The ABB IDAL HTTP server is vulnerable to a buffer overflow when a long Host header is sent in a web request. The Host header value overflows a buffer and overwrites a Structured Exception Handler (SEH) address. An unauthenticated attacker can submit a Host header value of 2047 bytes or more to overflow the buffer and overwrite the SEH address, which can then be leveraged to execute attacker-controlled code on the server.

EPSS

Процентиль: 92%
0.0758
Низкий

8.8 High

CVSS3

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 8.8
nvd
больше 6 лет назад

The ABB IDAL HTTP server is vulnerable to a buffer overflow when a long Host header is sent in a web request. The Host header value overflows a buffer and overwrites a Structured Exception Handler (SEH) address. An unauthenticated attacker can submit a Host header value of 2047 bytes or more to overflow the buffer and overwrite the SEH address, which can then be leveraged to execute attacker-controlled code on the server.

CVSS3: 8.8
fstec
больше 6 лет назад

Уязвимость HTTP-сервера IDAL инструмента проектирования пользовательского интерфейса PB610 Panel Builder 600 (SAP500900R0101), позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 92%
0.0758
Низкий

8.8 High

CVSS3

Дефекты

CWE-787