Secunia Security Advisory - A vulnerability has been reported in ABB PCU400, which can potentially be exploited by malicious people to compromise a vulnerable system.
69714c94753b78c6881d20c90efd9839aad4ffb9a41baa51f1e625cc0303f2c6
----------------------------------------------------------------------
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details:
http://secunia.com/binary_analysis/sample_analysis/
----------------------------------------------------------------------
TITLE:
ABB PCU400 X87 Buffer Overflow Vulnerability
SECUNIA ADVISORY ID:
SA32047
VERIFY ADVISORY:
http://secunia.com/advisories/32047/
CRITICAL:
Moderately critical
IMPACT:
DoS, System access
WHERE:
>From local network
SOFTWARE:
ABB PCU 400
http://secunia.com/advisories/product/19970/
DESCRIPTION:
A vulnerability has been reported in ABB PCU400, which can
potentially be exploited by malicious people to compromise a
vulnerable system.
A boundary error in the X87 executable within the handling of IEC
60870-5-101 and IEC 60870-5-104 communication protocols can be
exploited to cause a buffer overflow via specially crafted packets
send to port 8087/TCP.
Successful exploitation may allow execution of arbitrary code.
The vulnerability is reported in the X87 executable prior to version
3.5.5.
SOLUTION:
Update the X87 executable to version 3.5.5 or use the x88 or x89
executables.
PROVIDED AND/OR DISCOVERED BY:
Idan Ofrat of C4 Security
ORIGINAL ADVISORY:
C4 Security:
http://archives.neohapsis.com/archives/bugtraq/2008-09/0283.html
OTHER REFERENCES:
US-CERT VU#343971:
http://www.kb.cert.org/vuls/id/343971
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------