Search criteria
6 vulnerabilities found for ansi_c_source_code_libraries by trianglemicroworks
FKIE_CVE-2013-2794
Vulnerability from fkie_nvd - Published: 2013-09-09 11:39 - Updated: 2025-04-11 00:51
Severity ?
Summary
Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow physically proximate attackers to cause a denial of service (infinite loop) via crafted input over a serial line.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.06.0000:*:*:*:*:*:*:*",
"matchCriteriaId": "7DECC05A-BB49-47AD-841A-0D16582C3BD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.07.0000:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA92BB5-FEAC-4270-8FC4-65476D8258DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.08.0000:*:*:*:*:*:*:*",
"matchCriteriaId": "BB3A505C-89E2-4F5A-AC61-E036ABFC3322",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.09.0000:*:*:*:*:*:*:*",
"matchCriteriaId": "228B39FA-7B51-4AEE-986A-BD0AA3BA2FA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.10.0000:*:*:*:*:*:*:*",
"matchCriteriaId": "EA47CA21-A500-4B38-B103-58E224A39734",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.11.0000:*:*:*:*:*:*:*",
"matchCriteriaId": "C10643AE-4541-41DB-8ECF-D4CFD482628B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.12.0000:*:*:*:*:*:*:*",
"matchCriteriaId": "9A0824BE-769F-439F-A8DC-97F6EBCB81E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.13.0000:*:*:*:*:*:*:*",
"matchCriteriaId": "93B33FC8-D566-4BC8-97E2-3584BA9AC987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.14.0000:*:*:*:*:*:*:*",
"matchCriteriaId": "DFFE40C1-8E33-4295-A0E0-2FA1F5BAF9C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.15.0000:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB98E06-B56D-4168-A94C-8D7FCBA58FEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.06.0.171:*:*:*:*:*:*:*",
"matchCriteriaId": "FFDA2B53-1513-4DDF-B325-025FEFA5E16B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.07.00:*:*:*:*:*:*:*",
"matchCriteriaId": "12E48EA6-095F-49E5-B65E-A780C25C8FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.08.00:*:*:*:*:*:*:*",
"matchCriteriaId": "7D7B6492-A0B9-4D68-B39C-D4246A190638",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.09.00:*:*:*:*:*:*:*",
"matchCriteriaId": "E240AFBC-0AF6-4406-B726-2DD7B1CE10AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.10.00:*:*:*:*:*:*:*",
"matchCriteriaId": "13026105-3803-44D8-A224-4BA454917231",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.11.00:*:*:*:*:*:*:*",
"matchCriteriaId": "6DB5DBE4-796A-4D17-8805-7DB725CCFB4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.14.00:*:*:*:*:*:*:*",
"matchCriteriaId": "F1F5CDC3-ECE6-486D-AFB1-C570825202DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.15.00:*:*:*:*:*:*:*",
"matchCriteriaId": "FDF26C3C-1E7B-4243-A5FF-CD80CCCA2FCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.15.0.369:*:*:*:*:*:*:*",
"matchCriteriaId": "045F45E6-DB41-4D65-968B-CD04596004D0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "D2626C47-B68A-4A21-B5A2-9D64A28A7120",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.50.0309:*:*:*:*:*:*:*",
"matchCriteriaId": "69D2B52D-B324-4115-A3BB-51E3BF97758B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "9406C4EC-5758-458D-8354-6736CA78A660",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.53:*:*:*:*:*:*:*",
"matchCriteriaId": "EB915370-216E-40DC-AEF5-634230394E00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0515:*:*:*:*:*:*:*",
"matchCriteriaId": "22E5498C-D5F0-43F7-A536-AB65B4DEB49F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0516:*:*:*:*:*:*:*",
"matchCriteriaId": "2099DFC5-F241-4C47-9A17-FE40101A4570",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0517:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E898A9-7F0E-453C-8509-75E7E1290382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0518:*:*:*:*:*:*:*",
"matchCriteriaId": "E513983A-C6A2-4E07-874B-880F7A013D53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0528:*:*:*:*:*:*:*",
"matchCriteriaId": "D6861F70-5798-4B41-BE94-BECCF16752BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0529:*:*:*:*:*:*:*",
"matchCriteriaId": "1B5722CA-130A-46B3-9A30-9661069890AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0536:*:*:*:*:*:*:*",
"matchCriteriaId": "F5E625A4-30E4-4D5B-81B2-B0B0569948DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0540:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6D03B5-2E8C-49E9-8A18-F367F72A4D50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0544:*:*:*:*:*:*:*",
"matchCriteriaId": "AF59F8E0-C4BA-4658-9B91-BACD59B9C482",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0545:*:*:*:*:*:*:*",
"matchCriteriaId": "BD36BB8A-C840-494B-835C-98EB0075CA62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0552:*:*:*:*:*:*:*",
"matchCriteriaId": "8FDB5301-887B-4950-A918-113B75D2BDE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0553:*:*:*:*:*:*:*",
"matchCriteriaId": "76BF9332-5F3E-4230-A742-2019B2DCEB22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0558:*:*:*:*:*:*:*",
"matchCriteriaId": "1610F5AE-3BB1-4BDB-8C88-A2B83DBE39C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0561:*:*:*:*:*:*:*",
"matchCriteriaId": "1E2A4B7A-D8DA-4A1E-8506-A2D377E7568D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0562:*:*:*:*:*:*:*",
"matchCriteriaId": "90EA0A71-B4C7-4F54-A439-4B0FA9637410",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0564:*:*:*:*:*:*:*",
"matchCriteriaId": "71B02213-096E-4CA2-8528-64E83EA06D27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0565:*:*:*:*:*:*:*",
"matchCriteriaId": "8EA1B917-A27E-4043-BD74-534B13916F3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0566:*:*:*:*:*:*:*",
"matchCriteriaId": "378C61EE-9420-42D3-9DA2-71F2D459ACE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0567:*:*:*:*:*:*:*",
"matchCriteriaId": "CA21BE3B-6C2E-4479-A9A0-E3966741B832",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0569:*:*:*:*:*:*:*",
"matchCriteriaId": "49C97936-8AF3-41D8-8D6B-F6C9C5F4B002",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0570:*:*:*:*:*:*:*",
"matchCriteriaId": "D3175298-E0A4-4571-BDCC-FDA81675BC67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0571:*:*:*:*:*:*:*",
"matchCriteriaId": "18BF8DF0-93D1-4ACA-BA78-B6DE0080AD52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0572:*:*:*:*:*:*:*",
"matchCriteriaId": "E1D5F9B2-38C5-45AC-9A33-80E61BAF0E17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0573:*:*:*:*:*:*:*",
"matchCriteriaId": "00666362-AD62-4942-96E8-C08BF087E34F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0574:*:*:*:*:*:*:*",
"matchCriteriaId": "5BC82C89-7D15-452D-8610-23F3952487E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0575:*:*:*:*:*:*:*",
"matchCriteriaId": "3D15DD91-4F01-4B95-8F9A-C4848800BDBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0576:*:*:*:*:*:*:*",
"matchCriteriaId": "9DF57506-CC34-473C-8165-CB26194E80BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0577:*:*:*:*:*:*:*",
"matchCriteriaId": "CC480C77-1950-4C3A-B77E-D2C2AC59FE20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0578:*:*:*:*:*:*:*",
"matchCriteriaId": "2044B8C6-D0C6-4A1E-9798-19912FFAE097",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0579:*:*:*:*:*:*:*",
"matchCriteriaId": "40D4B1C5-CE06-4082-9534-513BB99D7D7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0580:*:*:*:*:*:*:*",
"matchCriteriaId": "15E62697-E6BD-4796-9470-F6E125CD3F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0581:*:*:*:*:*:*:*",
"matchCriteriaId": "299D658E-143A-4556-A6FF-37EDA07828CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0582:*:*:*:*:*:*:*",
"matchCriteriaId": "7619010A-954E-4F5D-8DDB-0ED652E2A306",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0583:*:*:*:*:*:*:*",
"matchCriteriaId": "C042A0EB-AB96-4FD2-A19E-4E9101C2C63C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0584:*:*:*:*:*:*:*",
"matchCriteriaId": "B8B7B997-4D7F-4A34-822A-3AF52A4FA715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0586:*:*:*:*:*:*:*",
"matchCriteriaId": "3E073D1B-4FBF-4DE2-AA5A-1EE8774D20FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0587:*:*:*:*:*:*:*",
"matchCriteriaId": "2285B98B-3E80-4C5B-9D7D-DA7C250FBAD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0588:*:*:*:*:*:*:*",
"matchCriteriaId": "0EC58901-067E-485B-9723-9F344F306C39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0589:*:*:*:*:*:*:*",
"matchCriteriaId": "E4583789-CC14-48BB-83B5-AF1B6896B10B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0590:*:*:*:*:*:*:*",
"matchCriteriaId": "7CEC3409-0CED-41A8-8718-B0EFCA85DA49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0591:*:*:*:*:*:*:*",
"matchCriteriaId": "B4AEB67C-7DAF-44D2-BB32-FD9E86D8EA0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0592:*:*:*:*:*:*:*",
"matchCriteriaId": "383DA8F4-1DDD-43A9-8A53-721F5F449CA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0594:*:*:*:*:*:*:*",
"matchCriteriaId": "1AD95D30-4502-44EB-9C0C-D9A45CD24E5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0595:*:*:*:*:*:*:*",
"matchCriteriaId": "B9F60297-9FA4-47F6-98AF-B9662568D76F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0596:*:*:*:*:*:*:*",
"matchCriteriaId": "4E593FD2-7158-40D0-9F44-01C06BF96F06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0597:*:*:*:*:*:*:*",
"matchCriteriaId": "0D8A435F-8C6D-4584-8DB9-4A0C515F6D3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0598:*:*:*:*:*:*:*",
"matchCriteriaId": "5F210B77-F989-4931-AFBF-CEC2A175FC27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.54.0599:*:*:*:*:*:*:*",
"matchCriteriaId": "36BBE6AE-BEE1-441B-A5A4-30BD7FCFBF3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:3.00:*:*:*:*:*:*:*",
"matchCriteriaId": "F74C4546-500F-405C-B585-6F6C07065808",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:3.00.0616:*:*:*:*:*:*:*",
"matchCriteriaId": "7C679459-44C7-454C-9894-87ABE1F710F2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow physically proximate attackers to cause a denial of service (infinite loop) via crafted input over a serial line."
},
{
"lang": "es",
"value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 hasta 3.00.0616, Componentes de protocolo DNP3 .NET 3.06.0.171 hasta 3.15.0.369, y librer\u00edas C DNP3 3.06.0000 hasta 3.15.0000 permiten a un atacante con acceso f\u00edsico causar una denegaci\u00f3n de servicio (bucle infinito) a trav\u00e9s de una entrada manipulada a trav\u00e9s de puerto serie."
}
],
"id": "CVE-2013-2794",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-09-09T11:39:08.443",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01"
},
{
"source": "ics-cert@hq.dhs.gov",
"url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-2793
Vulnerability from fkie_nvd - Published: 2013-09-09 11:39 - Updated: 2025-04-11 00:51
Severity ?
Summary
Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow remote attackers to cause a denial of service (infinite loop) via a crafted DNP3 TCP packet.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| trianglemicroworks | .net_communication_protocol_components | 3.06.0.171 | |
| trianglemicroworks | .net_communication_protocol_components | 3.15.0.369 | |
| trianglemicroworks | ansi_c_source_code_libraries | 3.06.0000 | |
| trianglemicroworks | ansi_c_source_code_libraries | 3.15.0000 | |
| trianglemicroworks | scada_data_gateway | 2.50 | |
| trianglemicroworks | scada_data_gateway | 2.50.0309 | |
| trianglemicroworks | scada_data_gateway | 3.00.0616 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.06.0.171:*:*:*:*:*:*:*",
"matchCriteriaId": "FFDA2B53-1513-4DDF-B325-025FEFA5E16B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:.net_communication_protocol_components:3.15.0.369:*:*:*:*:*:*:*",
"matchCriteriaId": "045F45E6-DB41-4D65-968B-CD04596004D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.06.0000:*:*:*:*:*:*:*",
"matchCriteriaId": "7DECC05A-BB49-47AD-841A-0D16582C3BD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:ansi_c_source_code_libraries:3.15.0000:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB98E06-B56D-4168-A94C-8D7FCBA58FEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "D2626C47-B68A-4A21-B5A2-9D64A28A7120",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:2.50.0309:*:*:*:*:*:*:*",
"matchCriteriaId": "69D2B52D-B324-4115-A3BB-51E3BF97758B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:trianglemicroworks:scada_data_gateway:3.00.0616:*:*:*:*:*:*:*",
"matchCriteriaId": "7C679459-44C7-454C-9894-87ABE1F710F2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow remote attackers to cause a denial of service (infinite loop) via a crafted DNP3 TCP packet."
},
{
"lang": "es",
"value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 hasta 3.00.0616 , Componentes de Protocolo DNP3 .NET 3.06.0.171 hasta 3.15.0.369 y Librer\u00edas C DNP3 3.06.0000 hasta 3.15.0000 permiten a un atacante remoto causar una denegaci\u00f3n de servicio (bucle infinito) a trav\u00e9s de un paquete TCP DNP3 manipulado."
}
],
"id": "CVE-2013-2793",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-09-09T11:39:08.427",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01"
},
{
"source": "ics-cert@hq.dhs.gov",
"url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2013-2794 (GCVE-0-2013-2794)
Vulnerability from cvelistv5 – Published: 2013-09-09 10:00 – Updated: 2024-09-17 02:32
VLAI?
Summary
Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow physically proximate attackers to cause a denial of service (infinite loop) via crafted input over a serial line.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:52:19.981Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow physically proximate attackers to cause a denial of service (infinite loop) via crafted input over a serial line."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-09-09T10:00:00Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2013-2794",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow physically proximate attackers to cause a denial of service (infinite loop) via crafted input over a serial line."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01",
"refsource": "MISC",
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01"
},
{
"name": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf",
"refsource": "CONFIRM",
"url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2013-2794",
"datePublished": "2013-09-09T10:00:00Z",
"dateReserved": "2013-04-11T00:00:00Z",
"dateUpdated": "2024-09-17T02:32:41.574Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-2793 (GCVE-0-2013-2793)
Vulnerability from cvelistv5 – Published: 2013-09-09 10:00 – Updated: 2024-09-16 23:35
VLAI?
Summary
Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow remote attackers to cause a denial of service (infinite loop) via a crafted DNP3 TCP packet.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:52:19.970Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow remote attackers to cause a denial of service (infinite loop) via a crafted DNP3 TCP packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-09-09T10:00:00Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2013-2793",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow remote attackers to cause a denial of service (infinite loop) via a crafted DNP3 TCP packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01",
"refsource": "MISC",
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01"
},
{
"name": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf",
"refsource": "CONFIRM",
"url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2013-2793",
"datePublished": "2013-09-09T10:00:00Z",
"dateReserved": "2013-04-11T00:00:00Z",
"dateUpdated": "2024-09-16T23:35:30.140Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-2794 (GCVE-0-2013-2794)
Vulnerability from nvd – Published: 2013-09-09 10:00 – Updated: 2024-09-17 02:32
VLAI?
Summary
Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow physically proximate attackers to cause a denial of service (infinite loop) via crafted input over a serial line.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:52:19.981Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow physically proximate attackers to cause a denial of service (infinite loop) via crafted input over a serial line."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-09-09T10:00:00Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2013-2794",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow physically proximate attackers to cause a denial of service (infinite loop) via crafted input over a serial line."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01",
"refsource": "MISC",
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01"
},
{
"name": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf",
"refsource": "CONFIRM",
"url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2013-2794",
"datePublished": "2013-09-09T10:00:00Z",
"dateReserved": "2013-04-11T00:00:00Z",
"dateUpdated": "2024-09-17T02:32:41.574Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-2793 (GCVE-0-2013-2793)
Vulnerability from nvd – Published: 2013-09-09 10:00 – Updated: 2024-09-16 23:35
VLAI?
Summary
Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow remote attackers to cause a denial of service (infinite loop) via a crafted DNP3 TCP packet.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:52:19.970Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow remote attackers to cause a denial of service (infinite loop) via a crafted DNP3 TCP packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-09-09T10:00:00Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2013-2793",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow remote attackers to cause a denial of service (infinite loop) via a crafted DNP3 TCP packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01",
"refsource": "MISC",
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-13-240-01"
},
{
"name": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf",
"refsource": "CONFIRM",
"url": "http://www.trianglemicroworks.com/documents/mdnp_scl_whats_new.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2013-2793",
"datePublished": "2013-09-09T10:00:00Z",
"dateReserved": "2013-04-11T00:00:00Z",
"dateUpdated": "2024-09-16T23:35:30.140Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}