ID

VAR-201304-0005


CVE

CVE-2012-4695


TITLE

Rockwell Automation RSLinx Enterprise of LogReceiver.exe Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-002407

DESCRIPTION

LogReceiver.exe in Rockwell Automation RSLinx Enterprise CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 allows remote attackers to cause a denial of service (service outage) via a zero-byte UDP packet that is not properly handled by Logger.dll. RSLinx Enterprise is a standard OPC server software that bridges the communication between RSView Server and PLC. RSLinx Enterprise (LogReceiver.exe and Logger.dll) does not process input correctly, receiving a zero byte packet can cause a logic error, and the attacker sends a zero byte size to the 4444/UDP port (user configurable, not enabled by default) A packet, when the service ignores the inbound request, causes a denial of service attack. The following products are affected by this vulnerability: CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1 and CPR9-SR6. RSLinx Enterprise is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause an affected application to crash, denying service to legitimate users. The following versions are vulnerable: RSLinx Enterprise CPR9 RSLinx Enterprise CPR9-SR1 RSLinx Enterprise CPR9-SR2 RSLinx Enterprise CPR9-SR3 RSLinx Enterprise CPR9-SR4 RSLinx Enterprise CPR9-SR5 RSLinx Enterprise CPR9-SR5.1 RSLinx Enterprise CPR9-SR6. This software can establish communication links for Allen-Bradley (AB) programmable controllers, various Rockwell software, and AB application software

Trust: 2.79

sources: NVD: CVE-2012-4695 // JVNDB: JVNDB-2013-002407 // CNVD: CNVD-2013-02793 // BID: 58917 // IVD: fb05fb00-2352-11e6-abef-000c29c66e3d // VULHUB: VHN-57976 // VULMON: CVE-2012-4695

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: fb05fb00-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-02793

AFFECTED PRODUCTS

vendor:rslinxmodel:cpr9scope: - version: -

Trust: 1.6

vendor:rockwellautomationmodel:rslinx enterprisescope:eqversion:cpr9

Trust: 1.6

vendor:rockwell automationmodel:rslinx enterprisescope:eqversion:cpr9

Trust: 0.8

vendor:rockwell automationmodel:rslinx enterprisescope:eqversion:cpr9-sr1

Trust: 0.8

vendor:rockwell automationmodel:rslinx enterprisescope:eqversion:cpr9-sr2

Trust: 0.8

vendor:rockwell automationmodel:rslinx enterprisescope:eqversion:cpr9-sr3

Trust: 0.8

vendor:rockwell automationmodel:rslinx enterprisescope:eqversion:cpr9-sr4

Trust: 0.8

vendor:rockwell automationmodel:rslinx enterprisescope:eqversion:cpr9-sr5

Trust: 0.8

vendor:rockwell automationmodel:rslinx enterprisescope:eqversion:cpr9-sr5.1

Trust: 0.8

vendor:rockwell automationmodel:rslinx enterprisescope:eqversion:cpr9-sr6

Trust: 0.8

vendor:rockwellmodel:automation rslinx enterprise softwarescope: - version: -

Trust: 0.6

sources: IVD: fb05fb00-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-02793 // JVNDB: JVNDB-2013-002407 // CNNVD: CNNVD-201304-064 // NVD: CVE-2012-4695

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-4695
value: HIGH

Trust: 1.0

NVD: CVE-2012-4695
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-02793
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201304-064
value: HIGH

Trust: 0.6

IVD: fb05fb00-2352-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

VULHUB: VHN-57976
value: HIGH

Trust: 0.1

VULMON: CVE-2012-4695
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-4695
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2013-02793
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: fb05fb00-2352-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-57976
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: fb05fb00-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-02793 // VULHUB: VHN-57976 // VULMON: CVE-2012-4695 // JVNDB: JVNDB-2013-002407 // CNNVD: CNNVD-201304-064 // NVD: CVE-2012-4695

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-57976 // JVNDB: JVNDB-2013-002407 // NVD: CVE-2012-4695

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201304-064

TYPE

Input validation

Trust: 0.8

sources: IVD: fb05fb00-2352-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201304-064

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002407

PATCH

title:Top Pageurl:http://www.rockwellautomation.com/

Trust: 0.8

title:Partnerurl:http://jp.rockwellautomation.com/applications/gs/ap/gsjp.nsf/pages/partner

Trust: 0.8

title:Top Pageurl:http://jp.rockwellautomation.com/

Trust: 0.8

title:Patch for RSLinx Enterprise 'Logger.dll' Remote Denial of Service Vulnerability ( CNVD-2013-21807 )url:https://www.cnvd.org.cn/patchInfo/show/33168

Trust: 0.6

sources: CNVD: CNVD-2013-02793 // JVNDB: JVNDB-2013-002407

EXTERNAL IDS

db:NVDid:CVE-2012-4695

Trust: 3.7

db:ICS CERTid:ICSA-13-095-02

Trust: 3.2

db:BIDid:58917

Trust: 1.6

db:CNNVDid:CNNVD-201304-064

Trust: 0.9

db:CNVDid:CNVD-2013-02793

Trust: 0.8

db:JVNDBid:JVNDB-2013-002407

Trust: 0.8

db:SECUNIAid:52808

Trust: 0.6

db:IVDid:FB05FB00-2352-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-57976

Trust: 0.1

db:ICS CERTid:ICSA-13-095-02A

Trust: 0.1

db:VULMONid:CVE-2012-4695

Trust: 0.1

sources: IVD: fb05fb00-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-02793 // VULHUB: VHN-57976 // VULMON: CVE-2012-4695 // BID: 58917 // JVNDB: JVNDB-2013-002407 // CNNVD: CNNVD-201304-064 // NVD: CVE-2012-4695

REFERENCES

url:http://ics-cert.us-cert.gov/pdf/icsa-13-095-02.pdf

Trust: 3.2

url:https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

Trust: 2.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4695

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4695

Trust: 0.8

url:http://secunia.com/advisories/52808

Trust: 0.6

url:http://www.securityfocus.com/bid/58917

Trust: 0.6

url:http://www.rockwellautomation.com/

Trust: 0.3

url:http://www.rockwellautomation.com/rockwellsoftware/design/rslinx/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=28925

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://ics-cert.us-cert.gov/advisories/icsa-13-095-02a

Trust: 0.1

sources: CNVD: CNVD-2013-02793 // VULHUB: VHN-57976 // VULMON: CVE-2012-4695 // BID: 58917 // JVNDB: JVNDB-2013-002407 // CNNVD: CNNVD-201304-064 // NVD: CVE-2012-4695

CREDITS

Carsten Eiram of Risk Based Security.

Trust: 0.9

sources: BID: 58917 // CNNVD: CNNVD-201304-064

SOURCES

db:IVDid:fb05fb00-2352-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2013-02793
db:VULHUBid:VHN-57976
db:VULMONid:CVE-2012-4695
db:BIDid:58917
db:JVNDBid:JVNDB-2013-002407
db:CNNVDid:CNNVD-201304-064
db:NVDid:CVE-2012-4695

LAST UPDATE DATE

2025-04-11T22:48:56.795000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-02793date:2013-05-18T00:00:00
db:VULHUBid:VHN-57976date:2013-04-18T00:00:00
db:VULMONid:CVE-2012-4695date:2013-04-18T00:00:00
db:BIDid:58917date:2013-10-09T00:46:00
db:JVNDBid:JVNDB-2013-002407date:2013-04-22T00:00:00
db:CNNVDid:CNNVD-201304-064date:2013-04-19T00:00:00
db:NVDid:CVE-2012-4695date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:fb05fb00-2352-11e6-abef-000c29c66e3ddate:2013-04-09T00:00:00
db:CNVDid:CNVD-2013-02793date:2013-04-09T00:00:00
db:VULHUBid:VHN-57976date:2013-04-18T00:00:00
db:VULMONid:CVE-2012-4695date:2013-04-18T00:00:00
db:BIDid:58917date:2013-04-05T00:00:00
db:JVNDBid:JVNDB-2013-002407date:2013-04-22T00:00:00
db:CNNVDid:CNNVD-201304-064date:2013-04-08T00:00:00
db:NVDid:CVE-2012-4695date:2013-04-18T02:25:36.913