Lucene search

K
cve[email protected]CVE-2013-2806
HistoryMar 26, 2019 - 5:29 p.m.

CVE-2013-2806

2019-03-2617:29:00
CWE-190
web.nvd.nist.gov
34
rockwell automation
rslinx enterprise software
logreceiver.exe
cpr9
security advisory
cve-2013-2806
nvd
vulnerability
service crash
patch

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.8%

Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the โ€œEnd of Current Recordโ€ field. By sending a datagram to the service over Port 4444/UDP with the โ€œRecord Data Sizeโ€ field modified to a specifically oversized value, the service will calculate an undersized value for the โ€œTotal Record Size.โ€ Then the service will calculate an incorrect value for the โ€œEnd of Current Recordโ€ field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

Affected configurations

NVD
Node
rockwellautomationrslinx_enterpriseMatch5.10.00
OR
rockwellautomationrslinx_enterpriseMatch5.10.01
OR
rockwellautomationrslinx_enterpriseMatch5.20.00
OR
rockwellautomationrslinx_enterpriseMatch5.21.00
OR
rockwellautomationrslinx_enterpriseMatch5.30.00
OR
rockwellautomationrslinx_enterpriseMatch5.40.00
OR
rockwellautomationrslinx_enterpriseMatch5.50.00
OR
rockwellautomationrslinx_enterpriseMatch5.51.00
OR
rockwellautomationrslinx_enterpriseMatch5.60.00

CNA Affected

[
  {
    "product": "RSLinx Enterprise Software",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "CPR9"
      },
      {
        "status": "affected",
        "version": "CPR9-SR1"
      },
      {
        "status": "affected",
        "version": "CPR9-SR2"
      },
      {
        "status": "affected",
        "version": "CPR9-SR3"
      },
      {
        "status": "affected",
        "version": "CPR9-SR4"
      },
      {
        "status": "affected",
        "version": "CPR9-SR5"
      },
      {
        "status": "affected",
        "version": "CPR9-SR5.1"
      },
      {
        "status": "affected",
        "version": "CPR9-SR6"
      }
    ]
  }
]

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.8%

Related for CVE-2013-2806