Lucene search

K
cve[email protected]CVE-2013-2807
HistoryMar 26, 2019 - 5:29 p.m.

CVE-2013-2807

2019-03-2617:29:00
CWE-125
CWE-190
web.nvd.nist.gov
27
cve-2013-2807
rockwell automation
rslinx enterprise software
logreceiver.exe
cpr9
security advisory
input handling error

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.5%

Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the โ€œTotal Record Sizeโ€ field. By sending a datagram to the service over Port 4444/UDP with the โ€œRecord Data Sizeโ€ field modified to a specifically oversized value, the service will calculate an undersized value for the โ€œTotal Record Sizeโ€ that will cause an out-of-bounds read access violation that leads to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation Security Advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

Affected configurations

NVD
Node
rockwellautomationrslinx_enterpriseMatch5.10.00
OR
rockwellautomationrslinx_enterpriseMatch5.10.01
OR
rockwellautomationrslinx_enterpriseMatch5.20.00
OR
rockwellautomationrslinx_enterpriseMatch5.21.00
OR
rockwellautomationrslinx_enterpriseMatch5.30.00
OR
rockwellautomationrslinx_enterpriseMatch5.40.00
OR
rockwellautomationrslinx_enterpriseMatch5.50.00
OR
rockwellautomationrslinx_enterpriseMatch5.51.00
OR
rockwellautomationrslinx_enterpriseMatch5.60.00

CNA Affected

[
  {
    "product": "RSLinx Enterprise Software",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "CPR9"
      },
      {
        "status": "affected",
        "version": "CPR9-SR1"
      },
      {
        "status": "affected",
        "version": "CPR9-SR2"
      },
      {
        "status": "affected",
        "version": "CPR9-SR3"
      },
      {
        "status": "affected",
        "version": "CPR9-SR4"
      },
      {
        "status": "affected",
        "version": "CPR9-SR5"
      },
      {
        "status": "affected",
        "version": "CPR9-SR5.1"
      },
      {
        "status": "affected",
        "version": "CPR9-SR6"
      }
    ]
  }
]

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.5%

Related for CVE-2013-2807