CVE-2013-2806 (GCVE-0-2013-2806)
Vulnerability from cvelistv5
Published
2019-03-26 16:47
Modified
2024-08-06 15:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer overflow
Summary
Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the “End of Current Record” field. By sending a datagram to the service over Port 4444/UDP with the “Record Data Size” field modified to a specifically oversized value, the service will calculate an undersized value for the “Total Record Size.” Then the service will calculate an incorrect value for the “End of Current Record” field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Rockwell Automation | RSLinx Enterprise Software |
Version: CPR9 Version: CPR9-SR1 Version: CPR9-SR2 Version: CPR9-SR3 Version: CPR9-SR4 Version: CPR9-SR5 Version: CPR9-SR5.1 Version: CPR9-SR6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:52:21.058Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "RSLinx Enterprise Software", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "CPR9" }, { "status": "affected", "version": "CPR9-SR1" }, { "status": "affected", "version": "CPR9-SR2" }, { "status": "affected", "version": "CPR9-SR3" }, { "status": "affected", "version": "CPR9-SR4" }, { "status": "affected", "version": "CPR9-SR5" }, { "status": "affected", "version": "CPR9-SR5.1" }, { "status": "affected", "version": "CPR9-SR6" } ] } ], "datePublic": "2013-10-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the \u201cEnd of Current Record\u201d field. By sending a datagram to the service over Port 4444/UDP with the \u201cRecord Data Size\u201d field modified to a specifically oversized value, the service will calculate an undersized value for the \u201cTotal Record Size.\u201d Then the service will calculate an incorrect value for the \u201cEnd of Current Record\u201d field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "Integer overflow CWE-190", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-26T16:47:23", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2013-2806", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "RSLinx Enterprise Software", "version": { "version_data": [ { "version_value": "CPR9" }, { "version_value": "CPR9-SR1" }, { "version_value": "CPR9-SR2" }, { "version_value": "CPR9-SR3" }, { "version_value": "CPR9-SR4" }, { "version_value": "CPR9-SR5" }, { "version_value": "CPR9-SR5.1" }, { "version_value": "CPR9-SR6" } ] } } ] }, "vendor_name": "Rockwell Automation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the \u201cEnd of Current Record\u201d field. By sending a datagram to the service over Port 4444/UDP with the \u201cRecord Data Size\u201d field modified to a specifically oversized value, the service will calculate an undersized value for the \u201cTotal Record Size.\u201d Then the service will calculate an incorrect value for the \u201cEnd of Current Record\u201d field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer overflow CWE-190" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2013-2806", "datePublished": "2019-03-26T16:47:24", "dateReserved": "2013-04-11T00:00:00", "dateUpdated": "2024-08-06T15:52:21.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2013-2806\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2019-03-26T17:29:00.247\",\"lastModified\":\"2024-11-21T01:52:23.957\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the \u201cEnd of Current Record\u201d field. By sending a datagram to the service over Port 4444/UDP with the \u201cRecord Data Size\u201d field modified to a specifically oversized value, the service will calculate an undersized value for the \u201cTotal Record Size.\u201d Then the service will calculate an incorrect value for the \u201cEnd of Current Record\u201d field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599\"},{\"lang\":\"es\",\"value\":\"El software RSLinx Enterprise de Rockwell Automation (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1 y CPR9-SR6 no maneja la entrada correctamente y da como resultado un error l\u00f3gico si calcula un valor incorrecto para el campo \u201cEnd of Current Record\u201d. Al enviar un datagrama al servicio a trav\u00e9s del puerto 4444 / UDP con el campo \u201cRecord Data Size\u201dmodificado a un valor espec\u00edficamente sobredimensionado, el servicio calcular\u00e1 un valor de tama\u00f1o insuficiente para el \u201cTotal Record Size.\u201d. Luego, el servicio calcular\u00e1 un valor incorrecto para el campo \u201cEnd of Current Record\u201d, causando violaciones de acceso que conducen a un bloqueo del servicio. El servicio se puede recuperar con un reinicio manual. Los parches y detalles relacionados con estas vulnerabilidades se pueden encontrar en el siguiente enlace de aviso de seguridad de Rockwell Automation (se requiere inicio de sesi\u00f3n): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/5375\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.10.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D42DF440-5AC1-4B7D-9A32-A30E2807D21B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.10.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"436B1B6F-7B5F-4851-A04B-8E4FD1CCE75B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.20.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE341BF-F144-4F44-A232-0F4CB97CEAFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.21.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B9B5530-419A-4587-A1D9-9E92ABB99300\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.30.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49BDD83C-D14A-434D-BA89-8451011C5F07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.40.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C37C557-4DA4-4A4F-8F5A-33DF41D37C45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.50.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F17A84F-CFA8-4BA9-A3D5-9044F53FC9FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.51.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4648726F-63DB-4F97-9A20-B224FDE5AA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.60.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33F649D7-E46D-4378-B044-ABC7C20D1AAD\"}]}]}],\"references\":[{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…