ID

VAR-201304-0008


CVE

CVE-2012-4714


TITLE

Rockwell Automation FactoryTalk Services Platform of RNADiagnostics.dll Integer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2013-002409

DESCRIPTION

Integer overflow in RNADiagnostics.dll in Rockwell Automation FactoryTalk Services Platform (FTSP) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 allows remote attackers to cause a denial of service (service outage or RNADiagReceiver.exe daemon crash) via UDP data that specifies a large integer value. The FactoryTalk Services Platform provides general services for products and applications in the FactoryTalk system (such as diagnostic information, health monitoring services, and real-time data access). The attacker can block subsequent links and cause a denial of service . The following products are affected by this vulnerability: CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1 and CPR9-SR6. FactoryTalk Services Platform is prone to a denial-of-service vulnerability. The following versions are vulnerable: FactoryTalk Services Platform CPR9 FactoryTalk Services Platform CPR9-SR1 FactoryTalk Services Platform CPR9-SR2 FactoryTalk Services Platform CPR9-SR3 FactoryTalk Services Platform CPR9-SR4 FactoryTalk Services Platform CPR9-SR5 FactoryTalk Services Platform CPR9-SR5.1 FactoryTalk Services Platform CPR9-SR6

Trust: 2.52

sources: NVD: CVE-2012-4714 // JVNDB: JVNDB-2013-002409 // CNVD: CNVD-2013-02815 // BID: 58918 // VULHUB: VHN-57995

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-02815

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:factorytalk services platformscope:eqversion:cpr9

Trust: 1.6

vendor:rockwell automationmodel:factorytalk services platformscope:eqversion:cpr9

Trust: 0.8

vendor:rockwell automationmodel:factorytalk services platformscope:eqversion:cpr9-sr1

Trust: 0.8

vendor:rockwell automationmodel:factorytalk services platformscope:eqversion:cpr9-sr2

Trust: 0.8

vendor:rockwell automationmodel:factorytalk services platformscope:eqversion:cpr9-sr3

Trust: 0.8

vendor:rockwell automationmodel:factorytalk services platformscope:eqversion:cpr9-sr4

Trust: 0.8

vendor:rockwell automationmodel:factorytalk services platformscope:eqversion:cpr9-sr5

Trust: 0.8

vendor:rockwell automationmodel:factorytalk services platformscope:eqversion:cpr9-sr5.1

Trust: 0.8

vendor:rockwell automationmodel:factorytalk services platformscope:eqversion:cpr9-sr6

Trust: 0.8

vendor:rockwellmodel:automation factorytalk services platformscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2013-02815 // JVNDB: JVNDB-2013-002409 // CNNVD: CNNVD-201304-063 // NVD: CVE-2012-4714

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-4714
value: HIGH

Trust: 1.0

NVD: CVE-2012-4714
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-02815
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201304-063
value: HIGH

Trust: 0.6

VULHUB: VHN-57995
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-4714
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-02815
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-57995
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2013-02815 // VULHUB: VHN-57995 // JVNDB: JVNDB-2013-002409 // CNNVD: CNNVD-201304-063 // NVD: CVE-2012-4714

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.9

sources: VULHUB: VHN-57995 // JVNDB: JVNDB-2013-002409 // NVD: CVE-2012-4714

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201304-063

TYPE

digital error

Trust: 0.6

sources: CNNVD: CNNVD-201304-063

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002409

PATCH

title:Top Pageurl:http://www.rockwellautomation.com/

Trust: 0.8

title:Partnerurl:http://jp.rockwellautomation.com/applications/gs/ap/gsjp.nsf/pages/partner

Trust: 0.8

title:Top Pageurl:http://jp.rockwellautomation.com/

Trust: 0.8

sources: JVNDB: JVNDB-2013-002409

EXTERNAL IDS

db:NVDid:CVE-2012-4714

Trust: 3.4

db:ICS CERTid:ICSA-13-095-02

Trust: 3.1

db:BIDid:58918

Trust: 1.6

db:JVNDBid:JVNDB-2013-002409

Trust: 0.8

db:CNNVDid:CNNVD-201304-063

Trust: 0.7

db:CNVDid:CNVD-2013-02815

Trust: 0.6

db:SECUNIAid:52938

Trust: 0.6

db:VULHUBid:VHN-57995

Trust: 0.1

sources: CNVD: CNVD-2013-02815 // VULHUB: VHN-57995 // BID: 58918 // JVNDB: JVNDB-2013-002409 // CNNVD: CNNVD-201304-063 // NVD: CVE-2012-4714

REFERENCES

url:http://ics-cert.us-cert.gov/pdf/icsa-13-095-02.pdf

Trust: 3.1

url:https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4714

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4714

Trust: 0.8

url:http://secunia.com/advisories/52938

Trust: 0.6

url:http://www.securityfocus.com/bid/58918

Trust: 0.6

url:http://www.rockwellautomation.com/

Trust: 0.3

sources: CNVD: CNVD-2013-02815 // VULHUB: VHN-57995 // BID: 58918 // JVNDB: JVNDB-2013-002409 // CNNVD: CNNVD-201304-063 // NVD: CVE-2012-4714

CREDITS

Carsten Eiram of Risk Based Security

Trust: 0.9

sources: BID: 58918 // CNNVD: CNNVD-201304-063

SOURCES

db:CNVDid:CNVD-2013-02815
db:VULHUBid:VHN-57995
db:BIDid:58918
db:JVNDBid:JVNDB-2013-002409
db:CNNVDid:CNNVD-201304-063
db:NVDid:CVE-2012-4714

LAST UPDATE DATE

2025-04-11T22:48:56.836000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-02815date:2013-04-09T00:00:00
db:VULHUBid:VHN-57995date:2013-04-18T00:00:00
db:BIDid:58918date:2013-10-09T00:46:00
db:JVNDBid:JVNDB-2013-002409date:2013-04-22T00:00:00
db:CNNVDid:CNNVD-201304-063date:2013-04-19T00:00:00
db:NVDid:CVE-2012-4714date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-02815date:2013-04-09T00:00:00
db:VULHUBid:VHN-57995date:2013-04-18T00:00:00
db:BIDid:58918date:2013-04-05T00:00:00
db:JVNDBid:JVNDB-2013-002409date:2013-04-22T00:00:00
db:CNNVDid:CNNVD-201304-063date:2013-04-11T00:00:00
db:NVDid:CVE-2012-4714date:2013-04-18T02:25:36.990