ID

VAR-201412-0520


CVE

CVE-2014-5429


TITLE

Elipse SCADA and Elipse Power of DNP Master Driver Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2014-005806

DESCRIPTION

DNP Master Driver 3.02 and earlier in Elipse SCADA 2.29 build 141 and earlier, E3 1.0 through 4.6, and Elipse Power 1.0 through 4.6 allows remote attackers to cause a denial of service (CPU consumption) via malformed packets. Multiple Elipse products are prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the affected process, denying service to legitimate users. Elipse Software SCADA etc. are the products of Brazil Elipse Software Company. Elipse Software SCADA is a set of software for deploying, implementing and integrating HMI and SCADA applications; Elipse Software E3 is a set of HMI/SCADA platforms that provide support for distributed applications, mission-critical applications and control centers; Elipse Software Power is A power management suite. DNP Master Driver is a DNP (communication protocol) master driver for it

Trust: 1.98

sources: NVD: CVE-2014-5429 // JVNDB: JVNDB-2014-005806 // BID: 71421 // VULHUB: VHN-73370

AFFECTED PRODUCTS

vendor:elipsemodel:powerscope:lteversion:4.6

Trust: 1.0

vendor:elipsemodel:e3scope:lteversion:4.6

Trust: 1.0

vendor:elipsemodel:scadascope:lteversion:2.29

Trust: 1.0

vendor:elipsemodel:e3scope:eqversion:1.0 to 4.6

Trust: 0.8

vendor:elipsemodel:powerscope:eqversion:1.0 to 4.6

Trust: 0.8

vendor:elipsemodel:scadascope:lteversion:2.29 build 141

Trust: 0.8

vendor:elipsemodel:e3scope:eqversion:4.6

Trust: 0.6

vendor:elipsemodel:scadascope:eqversion:2.29

Trust: 0.6

vendor:elipsemodel:powerscope:eqversion:4.6

Trust: 0.6

vendor:elipsemodel:software scada buildscope:eqversion:2.29141

Trust: 0.3

vendor:elipsemodel:software scadascope:eqversion:2.29

Trust: 0.3

vendor:elipsemodel:software power systemsscope:eqversion:4.6

Trust: 0.3

vendor:elipsemodel:software power systemsscope:eqversion:1.0

Trust: 0.3

vendor:elipsemodel:software e3scope:eqversion:4.6

Trust: 0.3

vendor:elipsemodel:software e3scope:eqversion:3.2

Trust: 0.3

vendor:elipsemodel:software e3scope:eqversion:3.0

Trust: 0.3

vendor:elipsemodel:software e3scope:eqversion:1.0

Trust: 0.3

vendor:elipsemodel:software dnp masterscope:eqversion:3.03.02

Trust: 0.3

vendor:elipsemodel:software dnp master driverscope:neversion:4.0.21

Trust: 0.3

sources: BID: 71421 // JVNDB: JVNDB-2014-005806 // CNNVD: CNNVD-201412-120 // NVD: CVE-2014-5429

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-5429
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-5429
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201412-120
value: MEDIUM

Trust: 0.6

VULHUB: VHN-73370
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-5429
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-73370
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-73370 // JVNDB: JVNDB-2014-005806 // CNNVD: CNNVD-201412-120 // NVD: CVE-2014-5429

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-73370 // JVNDB: JVNDB-2014-005806 // NVD: CVE-2014-5429

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201412-120

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201412-120

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-005806

PATCH

title:Top Pageurl:http://www.elipse.com.br/port/index.aspx

Trust: 0.8

sources: JVNDB: JVNDB-2014-005806

EXTERNAL IDS

db:NVDid:CVE-2014-5429

Trust: 2.8

db:ICS CERTid:ICSA-14-303-02

Trust: 2.8

db:BIDid:71421

Trust: 1.0

db:JVNDBid:JVNDB-2014-005806

Trust: 0.8

db:CNNVDid:CNNVD-201412-120

Trust: 0.7

db:VULHUBid:VHN-73370

Trust: 0.1

sources: VULHUB: VHN-73370 // BID: 71421 // JVNDB: JVNDB-2014-005806 // CNNVD: CNNVD-201412-120 // NVD: CVE-2014-5429

REFERENCES

url:http://ics-cert.us-cert.gov/advisories/icsa-14-303-02

Trust: 2.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5429

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-5429

Trust: 0.8

url:http://www.securityfocus.com/bid/71421

Trust: 0.6

url:http://www.elipse.com.br

Trust: 0.3

sources: VULHUB: VHN-73370 // BID: 71421 // JVNDB: JVNDB-2014-005806 // CNNVD: CNNVD-201412-120 // NVD: CVE-2014-5429

CREDITS

Adam Crain and Chris Sistrunk

Trust: 0.9

sources: BID: 71421 // CNNVD: CNNVD-201412-120

SOURCES

db:VULHUBid:VHN-73370
db:BIDid:71421
db:JVNDBid:JVNDB-2014-005806
db:CNNVDid:CNNVD-201412-120
db:NVDid:CVE-2014-5429

LAST UPDATE DATE

2025-04-13T23:25:20.556000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-73370date:2014-12-08T00:00:00
db:BIDid:71421date:2014-12-02T00:00:00
db:JVNDBid:JVNDB-2014-005806date:2014-12-10T00:00:00
db:CNNVDid:CNNVD-201412-120date:2014-12-22T00:00:00
db:NVDid:CVE-2014-5429date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-73370date:2014-12-06T00:00:00
db:BIDid:71421date:2014-12-02T00:00:00
db:JVNDBid:JVNDB-2014-005806date:2014-12-10T00:00:00
db:CNNVDid:CNNVD-201412-120date:2014-12-05T00:00:00
db:NVDid:CVE-2014-5429date:2014-12-06T15:59:03.047