CVE-2013-2806 (GCVE-0-2013-2806)

Vulnerability from cvelistv5 – Published: 2019-03-26 16:47 – Updated: 2024-08-06 15:52
VLAI?
Summary
Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the “End of Current Record” field. By sending a datagram to the service over Port 4444/UDP with the “Record Data Size” field modified to a specifically oversized value, the service will calculate an undersized value for the “Total Record Size.” Then the service will calculate an incorrect value for the “End of Current Record” field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599
Severity ?
No CVSS data available.
CWE
  • CWE-190 - Integer overflow CWE-190
Assigner
References
Impacted products
Vendor Product Version
Rockwell Automation RSLinx Enterprise Software Affected: CPR9
Affected: CPR9-SR1
Affected: CPR9-SR2
Affected: CPR9-SR3
Affected: CPR9-SR4
Affected: CPR9-SR5
Affected: CPR9-SR5.1
Affected: CPR9-SR6
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:52:21.058Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "RSLinx Enterprise Software",
          "vendor": "Rockwell Automation",
          "versions": [
            {
              "status": "affected",
              "version": "CPR9"
            },
            {
              "status": "affected",
              "version": "CPR9-SR1"
            },
            {
              "status": "affected",
              "version": "CPR9-SR2"
            },
            {
              "status": "affected",
              "version": "CPR9-SR3"
            },
            {
              "status": "affected",
              "version": "CPR9-SR4"
            },
            {
              "status": "affected",
              "version": "CPR9-SR5"
            },
            {
              "status": "affected",
              "version": "CPR9-SR5.1"
            },
            {
              "status": "affected",
              "version": "CPR9-SR6"
            }
          ]
        }
      ],
      "datePublic": "2013-10-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the \u201cEnd of Current Record\u201d field. By sending a datagram to the service over Port 4444/UDP with the \u201cRecord Data Size\u201d field modified to a specifically oversized value, the service will calculate an undersized value for the \u201cTotal Record Size.\u201d Then the service will calculate an incorrect value for the \u201cEnd of Current Record\u201d field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-190",
              "description": "Integer overflow CWE-190",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-03-26T16:47:23",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2013-2806",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "RSLinx Enterprise Software",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "CPR9"
                          },
                          {
                            "version_value": "CPR9-SR1"
                          },
                          {
                            "version_value": "CPR9-SR2"
                          },
                          {
                            "version_value": "CPR9-SR3"
                          },
                          {
                            "version_value": "CPR9-SR4"
                          },
                          {
                            "version_value": "CPR9-SR5"
                          },
                          {
                            "version_value": "CPR9-SR5.1"
                          },
                          {
                            "version_value": "CPR9-SR6"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Rockwell Automation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the \u201cEnd of Current Record\u201d field. By sending a datagram to the service over Port 4444/UDP with the \u201cRecord Data Size\u201d field modified to a specifically oversized value, the service will calculate an undersized value for the \u201cTotal Record Size.\u201d Then the service will calculate an incorrect value for the \u201cEnd of Current Record\u201d field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Integer overflow CWE-190"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2013-2806",
    "datePublished": "2019-03-26T16:47:24",
    "dateReserved": "2013-04-11T00:00:00",
    "dateUpdated": "2024-08-06T15:52:21.058Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.10.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D42DF440-5AC1-4B7D-9A32-A30E2807D21B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.10.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"436B1B6F-7B5F-4851-A04B-8E4FD1CCE75B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.20.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECE341BF-F144-4F44-A232-0F4CB97CEAFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.21.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B9B5530-419A-4587-A1D9-9E92ABB99300\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.30.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49BDD83C-D14A-434D-BA89-8451011C5F07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.40.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C37C557-4DA4-4A4F-8F5A-33DF41D37C45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.50.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F17A84F-CFA8-4BA9-A3D5-9044F53FC9FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.51.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4648726F-63DB-4F97-9A20-B224FDE5AA53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.60.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33F649D7-E46D-4378-B044-ABC7C20D1AAD\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the \\u201cEnd of Current Record\\u201d field. By sending a datagram to the service over Port 4444/UDP with the \\u201cRecord Data Size\\u201d field modified to a specifically oversized value, the service will calculate an undersized value for the \\u201cTotal Record Size.\\u201d Then the service will calculate an incorrect value for the \\u201cEnd of Current Record\\u201d field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599\"}, {\"lang\": \"es\", \"value\": \"El software RSLinx Enterprise de Rockwell Automation (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1 y CPR9-SR6 no maneja la entrada correctamente y da como resultado un error l\\u00f3gico si calcula un valor incorrecto para el campo \\u201cEnd of Current Record\\u201d. Al enviar un datagrama al servicio a trav\\u00e9s del puerto 4444 / UDP con el campo \\u201cRecord Data Size\\u201dmodificado a un valor espec\\u00edficamente sobredimensionado, el servicio calcular\\u00e1 un valor de tama\\u00f1o insuficiente para el \\u201cTotal Record Size.\\u201d. Luego, el servicio calcular\\u00e1 un valor incorrecto para el campo \\u201cEnd of Current Record\\u201d, causando violaciones de acceso que conducen a un bloqueo del servicio. El servicio se puede recuperar con un reinicio manual. Los parches y detalles relacionados con estas vulnerabilidades se pueden encontrar en el siguiente enlace de aviso de seguridad de Rockwell Automation (se requiere inicio de sesi\\u00f3n): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/5375\"}]",
      "id": "CVE-2013-2806",
      "lastModified": "2024-11-21T01:52:23.957",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2019-03-26T17:29:00.247",
      "references": "[{\"url\": \"https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}]",
      "sourceIdentifier": "ics-cert@hq.dhs.gov",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-190\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-190\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-2806\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2019-03-26T17:29:00.247\",\"lastModified\":\"2024-11-21T01:52:23.957\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the \u201cEnd of Current Record\u201d field. By sending a datagram to the service over Port 4444/UDP with the \u201cRecord Data Size\u201d field modified to a specifically oversized value, the service will calculate an undersized value for the \u201cTotal Record Size.\u201d Then the service will calculate an incorrect value for the \u201cEnd of Current Record\u201d field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599\"},{\"lang\":\"es\",\"value\":\"El software RSLinx Enterprise de Rockwell Automation (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1 y CPR9-SR6 no maneja la entrada correctamente y da como resultado un error l\u00f3gico si calcula un valor incorrecto para el campo \u201cEnd of Current Record\u201d. Al enviar un datagrama al servicio a trav\u00e9s del puerto 4444 / UDP con el campo \u201cRecord Data Size\u201dmodificado a un valor espec\u00edficamente sobredimensionado, el servicio calcular\u00e1 un valor de tama\u00f1o insuficiente para el \u201cTotal Record Size.\u201d. Luego, el servicio calcular\u00e1 un valor incorrecto para el campo \u201cEnd of Current Record\u201d, causando violaciones de acceso que conducen a un bloqueo del servicio. El servicio se puede recuperar con un reinicio manual. Los parches y detalles relacionados con estas vulnerabilidades se pueden encontrar en el siguiente enlace de aviso de seguridad de Rockwell Automation (se requiere inicio de sesi\u00f3n): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/5375\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.10.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D42DF440-5AC1-4B7D-9A32-A30E2807D21B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.10.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"436B1B6F-7B5F-4851-A04B-8E4FD1CCE75B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.20.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE341BF-F144-4F44-A232-0F4CB97CEAFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.21.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B9B5530-419A-4587-A1D9-9E92ABB99300\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.30.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49BDD83C-D14A-434D-BA89-8451011C5F07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.40.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C37C557-4DA4-4A4F-8F5A-33DF41D37C45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.50.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F17A84F-CFA8-4BA9-A3D5-9044F53FC9FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.51.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4648726F-63DB-4F97-9A20-B224FDE5AA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.60.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33F649D7-E46D-4378-B044-ABC7C20D1AAD\"}]}]}],\"references\":[{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…