CVE-2019-7231
Published Jun 24, 2019
Last updated 2 years ago
Overview
- Description
- The ABB IDAL FTP server is vulnerable to a buffer overflow when a long string is sent by an authenticated attacker. This overflow is handled, but terminates the process. An authenticated attacker can send a FTP command string of 472 bytes or more to overflow a buffer, causing an exception that terminates the server.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.7
- Impact score
- 3.6
- Exploitability score
- 2.1
- Vector string
- CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 2.7
- Impact score
- 2.9
- Exploitability score
- 5.1
- Vector string
- AV:A/AC:L/Au:S/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:pb610_panel_builder_600_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C8196F7-A7BA-46FA-98E0-F0A261C18FFC", "versionEndIncluding": "2.8.0.367", "versionStartIncluding": "1.91" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:pb610_panel_builder_600:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "992F7F8C-DDBB-4BA7-95B1-86CD40B173DB" } ], "operator": "OR" } ], "operator": "AND" } ]