Vulnerabilites related to trianglemicroworks - ansi_c_source_code_libraries
Vulnerability from fkie_nvd
Published
2013-09-09 11:39
Modified
2025-04-11 00:51
Severity ?
Summary
Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow remote attackers to cause a denial of service (infinite loop) via a crafted DNP3 TCP packet.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trianglemicroworks | .net_communication_protocol_components | 3.06.0.171 | |
trianglemicroworks | .net_communication_protocol_components | 3.15.0.369 | |
trianglemicroworks | ansi_c_source_code_libraries | 3.06.0000 | |
trianglemicroworks | ansi_c_source_code_libraries | 3.15.0000 | |
trianglemicroworks | scada_data_gateway | 2.50 | |
trianglemicroworks | scada_data_gateway | 2.50.0309 | |
trianglemicroworks | scada_data_gateway | 3.00.0616 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.06.0.171:*:*:*:*:*:*:*", "matchCriteriaId": "FFDA2B53-1513-4DDF-B325-025FEFA5E16B", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.15.0.369:*:*:*:*:*:*:*", "matchCriteriaId": "045F45E6-DB41-4D65-968B-CD04596004D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.06.0000:*:*:*:*:*:*:*", "matchCriteriaId": "7DECC05A-BB49-47AD-841A-0D16582C3BD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.15.0000:*:*:*:*:*:*:*", "matchCriteriaId": "AEB98E06-B56D-4168-A94C-8D7FCBA58FEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.50:*:*:*:*:*:*:*", "matchCriteriaId": "D2626C47-B68A-4A21-B5A2-9D64A28A7120", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.50.0309:*:*:*:*:*:*:*", "matchCriteriaId": "69D2B52D-B324-4115-A3BB-51E3BF97758B", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:3.00.0616:*:*:*:*:*:*:*", "matchCriteriaId": "7C679459-44C7-454C-9894-87ABE1F710F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow remote attackers to cause a denial of service (infinite loop) via a crafted DNP3 TCP packet." }, { "lang": "es", "value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 hasta 3.00.0616 , Componentes de Protocolo DNP3 .NET 3.06.0.171 hasta 3.15.0.369 y Librer\u00edas C DNP3 3.06.0000 hasta 3.15.0000 permiten a un atacante remoto causar una denegaci\u00f3n de servicio (bucle infinito) a trav\u00e9s de un paquete TCP DNP3 manipulado." } ], "id": "CVE-2013-2793", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-09T11:39:08.427", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01" }, { "source": "ics-cert@hq.dhs.gov", "url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-09 11:39
Modified
2025-04-11 00:51
Severity ?
Summary
Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow physically proximate attackers to cause a denial of service (infinite loop) via crafted input over a serial line.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.06.0000:*:*:*:*:*:*:*", "matchCriteriaId": "7DECC05A-BB49-47AD-841A-0D16582C3BD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.07.0000:*:*:*:*:*:*:*", "matchCriteriaId": "7CA92BB5-FEAC-4270-8FC4-65476D8258DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.08.0000:*:*:*:*:*:*:*", "matchCriteriaId": "BB3A505C-89E2-4F5A-AC61-E036ABFC3322", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.09.0000:*:*:*:*:*:*:*", "matchCriteriaId": "228B39FA-7B51-4AEE-986A-BD0AA3BA2FA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.10.0000:*:*:*:*:*:*:*", "matchCriteriaId": "EA47CA21-A500-4B38-B103-58E224A39734", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.11.0000:*:*:*:*:*:*:*", "matchCriteriaId": "C10643AE-4541-41DB-8ECF-D4CFD482628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.12.0000:*:*:*:*:*:*:*", "matchCriteriaId": "9A0824BE-769F-439F-A8DC-97F6EBCB81E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.13.0000:*:*:*:*:*:*:*", "matchCriteriaId": "93B33FC8-D566-4BC8-97E2-3584BA9AC987", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.14.0000:*:*:*:*:*:*:*", "matchCriteriaId": "DFFE40C1-8E33-4295-A0E0-2FA1F5BAF9C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.15.0000:*:*:*:*:*:*:*", "matchCriteriaId": "AEB98E06-B56D-4168-A94C-8D7FCBA58FEF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.06.0.171:*:*:*:*:*:*:*", "matchCriteriaId": "FFDA2B53-1513-4DDF-B325-025FEFA5E16B", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.07.00:*:*:*:*:*:*:*", "matchCriteriaId": "12E48EA6-095F-49E5-B65E-A780C25C8FCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.08.00:*:*:*:*:*:*:*", "matchCriteriaId": "7D7B6492-A0B9-4D68-B39C-D4246A190638", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.09.00:*:*:*:*:*:*:*", "matchCriteriaId": "E240AFBC-0AF6-4406-B726-2DD7B1CE10AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.10.00:*:*:*:*:*:*:*", "matchCriteriaId": "13026105-3803-44D8-A224-4BA454917231", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.11.00:*:*:*:*:*:*:*", "matchCriteriaId": "6DB5DBE4-796A-4D17-8805-7DB725CCFB4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.14.00:*:*:*:*:*:*:*", "matchCriteriaId": "F1F5CDC3-ECE6-486D-AFB1-C570825202DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.15.00:*:*:*:*:*:*:*", "matchCriteriaId": "FDF26C3C-1E7B-4243-A5FF-CD80CCCA2FCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.15.0.369:*:*:*:*:*:*:*", "matchCriteriaId": "045F45E6-DB41-4D65-968B-CD04596004D0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.50:*:*:*:*:*:*:*", "matchCriteriaId": "D2626C47-B68A-4A21-B5A2-9D64A28A7120", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.50.0309:*:*:*:*:*:*:*", "matchCriteriaId": "69D2B52D-B324-4115-A3BB-51E3BF97758B", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.51:*:*:*:*:*:*:*", "matchCriteriaId": "9406C4EC-5758-458D-8354-6736CA78A660", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.53:*:*:*:*:*:*:*", "matchCriteriaId": "EB915370-216E-40DC-AEF5-634230394E00", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0515:*:*:*:*:*:*:*", "matchCriteriaId": "22E5498C-D5F0-43F7-A536-AB65B4DEB49F", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0516:*:*:*:*:*:*:*", "matchCriteriaId": "2099DFC5-F241-4C47-9A17-FE40101A4570", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0517:*:*:*:*:*:*:*", "matchCriteriaId": "F1E898A9-7F0E-453C-8509-75E7E1290382", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0518:*:*:*:*:*:*:*", "matchCriteriaId": "E513983A-C6A2-4E07-874B-880F7A013D53", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0528:*:*:*:*:*:*:*", "matchCriteriaId": "D6861F70-5798-4B41-BE94-BECCF16752BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0529:*:*:*:*:*:*:*", "matchCriteriaId": "1B5722CA-130A-46B3-9A30-9661069890AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0536:*:*:*:*:*:*:*", "matchCriteriaId": "F5E625A4-30E4-4D5B-81B2-B0B0569948DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0540:*:*:*:*:*:*:*", "matchCriteriaId": "5A6D03B5-2E8C-49E9-8A18-F367F72A4D50", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0544:*:*:*:*:*:*:*", "matchCriteriaId": "AF59F8E0-C4BA-4658-9B91-BACD59B9C482", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0545:*:*:*:*:*:*:*", "matchCriteriaId": "BD36BB8A-C840-494B-835C-98EB0075CA62", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0552:*:*:*:*:*:*:*", "matchCriteriaId": "8FDB5301-887B-4950-A918-113B75D2BDE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0553:*:*:*:*:*:*:*", "matchCriteriaId": "76BF9332-5F3E-4230-A742-2019B2DCEB22", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0558:*:*:*:*:*:*:*", "matchCriteriaId": "1610F5AE-3BB1-4BDB-8C88-A2B83DBE39C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0561:*:*:*:*:*:*:*", "matchCriteriaId": "1E2A4B7A-D8DA-4A1E-8506-A2D377E7568D", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0562:*:*:*:*:*:*:*", "matchCriteriaId": "90EA0A71-B4C7-4F54-A439-4B0FA9637410", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0564:*:*:*:*:*:*:*", "matchCriteriaId": "71B02213-096E-4CA2-8528-64E83EA06D27", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0565:*:*:*:*:*:*:*", "matchCriteriaId": "8EA1B917-A27E-4043-BD74-534B13916F3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0566:*:*:*:*:*:*:*", "matchCriteriaId": "378C61EE-9420-42D3-9DA2-71F2D459ACE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0567:*:*:*:*:*:*:*", "matchCriteriaId": "CA21BE3B-6C2E-4479-A9A0-E3966741B832", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0569:*:*:*:*:*:*:*", "matchCriteriaId": "49C97936-8AF3-41D8-8D6B-F6C9C5F4B002", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0570:*:*:*:*:*:*:*", "matchCriteriaId": "D3175298-E0A4-4571-BDCC-FDA81675BC67", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0571:*:*:*:*:*:*:*", "matchCriteriaId": "18BF8DF0-93D1-4ACA-BA78-B6DE0080AD52", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0572:*:*:*:*:*:*:*", "matchCriteriaId": "E1D5F9B2-38C5-45AC-9A33-80E61BAF0E17", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0573:*:*:*:*:*:*:*", "matchCriteriaId": "00666362-AD62-4942-96E8-C08BF087E34F", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0574:*:*:*:*:*:*:*", "matchCriteriaId": "5BC82C89-7D15-452D-8610-23F3952487E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0575:*:*:*:*:*:*:*", "matchCriteriaId": "3D15DD91-4F01-4B95-8F9A-C4848800BDBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0576:*:*:*:*:*:*:*", "matchCriteriaId": "9DF57506-CC34-473C-8165-CB26194E80BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0577:*:*:*:*:*:*:*", "matchCriteriaId": "CC480C77-1950-4C3A-B77E-D2C2AC59FE20", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0578:*:*:*:*:*:*:*", "matchCriteriaId": "2044B8C6-D0C6-4A1E-9798-19912FFAE097", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0579:*:*:*:*:*:*:*", "matchCriteriaId": "40D4B1C5-CE06-4082-9534-513BB99D7D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0580:*:*:*:*:*:*:*", "matchCriteriaId": "15E62697-E6BD-4796-9470-F6E125CD3F4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0581:*:*:*:*:*:*:*", "matchCriteriaId": "299D658E-143A-4556-A6FF-37EDA07828CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0582:*:*:*:*:*:*:*", "matchCriteriaId": "7619010A-954E-4F5D-8DDB-0ED652E2A306", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0583:*:*:*:*:*:*:*", "matchCriteriaId": "C042A0EB-AB96-4FD2-A19E-4E9101C2C63C", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0584:*:*:*:*:*:*:*", "matchCriteriaId": "B8B7B997-4D7F-4A34-822A-3AF52A4FA715", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0586:*:*:*:*:*:*:*", "matchCriteriaId": "3E073D1B-4FBF-4DE2-AA5A-1EE8774D20FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0587:*:*:*:*:*:*:*", "matchCriteriaId": "2285B98B-3E80-4C5B-9D7D-DA7C250FBAD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0588:*:*:*:*:*:*:*", "matchCriteriaId": "0EC58901-067E-485B-9723-9F344F306C39", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0589:*:*:*:*:*:*:*", "matchCriteriaId": "E4583789-CC14-48BB-83B5-AF1B6896B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0590:*:*:*:*:*:*:*", "matchCriteriaId": "7CEC3409-0CED-41A8-8718-B0EFCA85DA49", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0591:*:*:*:*:*:*:*", "matchCriteriaId": "B4AEB67C-7DAF-44D2-BB32-FD9E86D8EA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0592:*:*:*:*:*:*:*", "matchCriteriaId": "383DA8F4-1DDD-43A9-8A53-721F5F449CA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0594:*:*:*:*:*:*:*", "matchCriteriaId": "1AD95D30-4502-44EB-9C0C-D9A45CD24E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0595:*:*:*:*:*:*:*", "matchCriteriaId": "B9F60297-9FA4-47F6-98AF-B9662568D76F", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0596:*:*:*:*:*:*:*", "matchCriteriaId": "4E593FD2-7158-40D0-9F44-01C06BF96F06", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0597:*:*:*:*:*:*:*", "matchCriteriaId": "0D8A435F-8C6D-4584-8DB9-4A0C515F6D3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0598:*:*:*:*:*:*:*", "matchCriteriaId": "5F210B77-F989-4931-AFBF-CEC2A175FC27", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0599:*:*:*:*:*:*:*", "matchCriteriaId": "36BBE6AE-BEE1-441B-A5A4-30BD7FCFBF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:3.00:*:*:*:*:*:*:*", "matchCriteriaId": "F74C4546-500F-405C-B585-6F6C07065808", "vulnerable": true }, { "criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:3.00.0616:*:*:*:*:*:*:*", "matchCriteriaId": "7C679459-44C7-454C-9894-87ABE1F710F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow physically proximate attackers to cause a denial of service (infinite loop) via crafted input over a serial line." }, { "lang": "es", "value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 hasta 3.00.0616, Componentes de protocolo DNP3 .NET 3.06.0.171 hasta 3.15.0.369, y librer\u00edas C DNP3 3.06.0000 hasta 3.15.0000 permiten a un atacante con acceso f\u00edsico causar una denegaci\u00f3n de servicio (bucle infinito) a trav\u00e9s de una entrada manipulada a trav\u00e9s de puerto serie." } ], "id": "CVE-2013-2794", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-09T11:39:08.443", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01" }, { "source": "ics-cert@hq.dhs.gov", "url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2013-2794 (GCVE-0-2013-2794)
Vulnerability from cvelistv5
Published
2013-09-09 10:00
Modified
2024-09-17 02:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow physically proximate attackers to cause a denial of service (infinite loop) via crafted input over a serial line.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:52:19.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow physically proximate attackers to cause a denial of service (infinite loop) via crafted input over a serial line." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-09-09T10:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2013-2794", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow physically proximate attackers to cause a denial of service (infinite loop) via crafted input over a serial line." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01" }, { "name": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf", "refsource": "CONFIRM", "url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2013-2794", "datePublished": "2013-09-09T10:00:00Z", "dateReserved": "2013-04-11T00:00:00Z", "dateUpdated": "2024-09-17T02:32:41.574Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-2793 (GCVE-0-2013-2793)
Vulnerability from cvelistv5
Published
2013-09-09 10:00
Modified
2024-09-16 23:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow remote attackers to cause a denial of service (infinite loop) via a crafted DNP3 TCP packet.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:52:19.970Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow remote attackers to cause a denial of service (infinite loop) via a crafted DNP3 TCP packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-09-09T10:00:00Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2013-2793", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow remote attackers to cause a denial of service (infinite loop) via a crafted DNP3 TCP packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01" }, { "name": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf", "refsource": "CONFIRM", "url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2013-2793", "datePublished": "2013-09-09T10:00:00Z", "dateReserved": "2013-04-11T00:00:00Z", "dateUpdated": "2024-09-16T23:35:30.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }