ABB WebWare RobNetScanHost.exe Remote Code Execution VulnerabilityZDI-12-033: February 22nd, 2012
TippingPoint™ IPS Customer ProtectionTippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 11594. For further product information on the TippingPoint IPS:
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ABB WebWare. Authentication is not required to exploit this vulnerability.
The specific flaw exists within RobNetScanHost.exe and its parsing of network packets accepted on port 5512. The parsing of 'Netscan' packets with opcodes 0xE and 0xA are vulnerable to a stack-based buffer overflow with a fixed allocation of 20 bytes. This vulnerability can be exploited to execute arbitrary code in the context of the service process (LocalSystem).
Vendor ResponseABB has issued an update to correct this vulnerability. More details can be found at:
2011-10-10 - Vulnerability reported to vendor
2012-02-22 - Coordinated public release of advisory
CreditThis vulnerability was discovered by: