Show plain JSON{"id": "CVE-2013-2806", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2019-03-26T17:29:00.247", "references": [{"url": "https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02", "tags": ["Third Party Advisory", "US Government Resource"], "source": "ics-cert@hq.dhs.gov"}, {"url": "https://ics-cert.us-cert.gov/advisories/ICSA-13-095-02", "tags": ["Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ics-cert@hq.dhs.gov", "description": [{"lang": "en", "value": "CWE-190"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-190"}]}], "descriptions": [{"lang": "en", "value": "Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the \u201cEnd of Current Record\u201d field. By sending a datagram to the service over Port 4444/UDP with the \u201cRecord Data Size\u201d field modified to a specifically oversized value, the service will calculate an undersized value for the \u201cTotal Record Size.\u201d Then the service will calculate an incorrect value for the \u201cEnd of Current Record\u201d field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599"}, {"lang": "es", "value": "El software RSLinx Enterprise de Rockwell Automation (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1 y CPR9-SR6 no maneja la entrada correctamente y da como resultado un error l\u00f3gico si calcula un valor incorrecto para el campo \u201cEnd of Current Record\u201d. Al enviar un datagrama al servicio a trav\u00e9s del puerto 4444 / UDP con el campo \u201cRecord Data Size\u201dmodificado a un valor espec\u00edficamente sobredimensionado, el servicio calcular\u00e1 un valor de tama\u00f1o insuficiente para el \u201cTotal Record Size.\u201d. Luego, el servicio calcular\u00e1 un valor incorrecto para el campo \u201cEnd of Current Record\u201d, causando violaciones de acceso que conducen a un bloqueo del servicio. El servicio se puede recuperar con un reinicio manual. Los parches y detalles relacionados con estas vulnerabilidades se pueden encontrar en el siguiente enlace de aviso de seguridad de Rockwell Automation (se requiere inicio de sesi\u00f3n): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/5375"}], "lastModified": "2024-11-21T01:52:23.957", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.10.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D42DF440-5AC1-4B7D-9A32-A30E2807D21B"}, {"criteria": "cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.10.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "436B1B6F-7B5F-4851-A04B-8E4FD1CCE75B"}, {"criteria": "cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.20.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECE341BF-F144-4F44-A232-0F4CB97CEAFF"}, {"criteria": "cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.21.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B9B5530-419A-4587-A1D9-9E92ABB99300"}, {"criteria": "cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.30.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49BDD83C-D14A-434D-BA89-8451011C5F07"}, {"criteria": "cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.40.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C37C557-4DA4-4A4F-8F5A-33DF41D37C45"}, {"criteria": "cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.50.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F17A84F-CFA8-4BA9-A3D5-9044F53FC9FF"}, {"criteria": "cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.51.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4648726F-63DB-4F97-9A20-B224FDE5AA53"}, {"criteria": "cpe:2.3:a:rockwellautomation:rslinx_enterprise:5.60.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33F649D7-E46D-4378-B044-ABC7C20D1AAD"}], "operator": "OR"}]}], "sourceIdentifier": "ics-cert@hq.dhs.gov"}