TippingPoint Zero Day Initiative
 

ABB WebWare RobNetScanHost.exe Remote Code Execution Vulnerability

ZDI-12-033: February 22nd, 2012

CVSS Score

Affected Vendors

Affected Products

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 11594. For further product information on the TippingPoint IPS:

Vulnerability Details


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ABB WebWare. Authentication is not required to exploit this vulnerability.

The specific flaw exists within RobNetScanHost.exe and its parsing of network packets accepted on port 5512. The parsing of 'Netscan' packets with opcodes 0xE and 0xA are vulnerable to a stack-based buffer overflow with a fixed allocation of 20 bytes. This vulnerability can be exploited to execute arbitrary code in the context of the service process (LocalSystem).

Vendor Response

ABB has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2011-10-10 - Vulnerability reported to vendor
    2012-02-22 - Coordinated public release of advisory

Credit

This vulnerability was discovered by:
    Luigi Auriemma