ID

VAR-201903-0604


CVE

CVE-2013-2805


TITLE

Rockwell Automation RSLinx Enterprise Software out-of-bounds vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2013-006839

DESCRIPTION

Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it receives a datagram with an incorrect value in the “Record Data Size” field. By sending a datagram to the service over Port 4444/UDP with the “Record Data Size” field modified to an oversized value, an attacker could cause an out-of-bounds read access violation that leads to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to this vulnerability can be found at the following Rockwell Automation Security Advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599. Rockwell Automation RSLinx Enterprise software (LogReceiver.exe) Contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. RSLinx Enterprise is a standard OPC server software that bridges the communication between RSView Server and PLC. Need to manually restart to get normal functions. RSLinx Enterprise is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause an affected application to crash, denying service to legitimate users. The following versions are vulnerable: RSLinx Enterprise CPR9 RSLinx Enterprise CPR9-SR1 RSLinx Enterprise CPR9-SR2 RSLinx Enterprise CPR9-SR3 RSLinx Enterprise CPR9-SR4 RSLinx Enterprise CPR9-SR5 RSLinx Enterprise CPR9-SR5.1 RSLinx Enterprise CPR9-SR6. This software can establish communication links for Allen-Bradley (AB) programmable controllers, various Rockwell software, and AB application software

Trust: 2.7

sources: NVD: CVE-2013-2805 // JVNDB: JVNDB-2013-006839 // CNVD: CNVD-2013-13665 // BID: 62879 // IVD: 017bbdee-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-62807

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 017bbdee-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-13665

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:rslinx enterprisescope:eqversion:5.30.00

Trust: 1.0

vendor:rockwellautomationmodel:rslinx enterprisescope:eqversion:5.10.01

Trust: 1.0

vendor:rockwellautomationmodel:rslinx enterprisescope:eqversion:5.10.00

Trust: 1.0

vendor:rockwellautomationmodel:rslinx enterprisescope:eqversion:5.20.00

Trust: 1.0

vendor:rockwellautomationmodel:rslinx enterprisescope:eqversion:5.60.00

Trust: 1.0

vendor:rockwellautomationmodel:rslinx enterprisescope:eqversion:5.40.00

Trust: 1.0

vendor:rockwellautomationmodel:rslinx enterprisescope:eqversion:5.50.00

Trust: 1.0

vendor:rockwellautomationmodel:rslinx enterprisescope:eqversion:5.51.00

Trust: 1.0

vendor:rockwellautomationmodel:rslinx enterprisescope:eqversion:5.21.00

Trust: 1.0

vendor:rockwell automationmodel:rslinx enterprisescope:eqversion:cpr9

Trust: 0.8

vendor:rockwell automationmodel:rslinx enterprisescope:eqversion:cpr9-sr1

Trust: 0.8

vendor:rockwell automationmodel:rslinx enterprisescope:eqversion:cpr9-sr2

Trust: 0.8

vendor:rockwell automationmodel:rslinx enterprisescope:eqversion:cpr9-sr3

Trust: 0.8

vendor:rockwell automationmodel:rslinx enterprisescope:eqversion:cpr9-sr4

Trust: 0.8

vendor:rockwell automationmodel:rslinx enterprisescope:eqversion:cpr9-sr5

Trust: 0.8

vendor:rockwell automationmodel:rslinx enterprisescope:eqversion:cpr9-sr5.1

Trust: 0.8

vendor:rockwell automationmodel:rslinx enterprisescope:eqversion:cpr9-sr6

Trust: 0.8

vendor:rockwellmodel:software rslinx enterprise cpr9scope: - version: -

Trust: 0.6

vendor:rockwellmodel:software rslinx enterprise cpr9-srxscope: - version: -

Trust: 0.6

vendor:rockwellmodel:automation rslinx enterprise cpr9-sr6scope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation rslinx enterprise cpr9-sr5.1scope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation rslinx enterprise cpr9-sr5scope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation rslinx enterprise cpr9-sr4scope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation rslinx enterprise cpr9-sr3scope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation rslinx enterprise cpr9-sr2scope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation rslinx enterprise cpr9-sr1scope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation rslinx enterprise cpr9scope: - version: -

Trust: 0.3

vendor:rslinxmodel: - scope:eqversion:5.10.00

Trust: 0.2

vendor:rslinxmodel: - scope:eqversion:5.10.01

Trust: 0.2

vendor:rslinxmodel: - scope:eqversion:5.20.00

Trust: 0.2

vendor:rslinxmodel: - scope:eqversion:5.21.00

Trust: 0.2

vendor:rslinxmodel: - scope:eqversion:5.30.00

Trust: 0.2

vendor:rslinxmodel: - scope:eqversion:5.40.00

Trust: 0.2

vendor:rslinxmodel: - scope:eqversion:5.50.00

Trust: 0.2

vendor:rslinxmodel: - scope:eqversion:5.51.00

Trust: 0.2

vendor:rslinxmodel: - scope:eqversion:5.60.00

Trust: 0.2

sources: IVD: 017bbdee-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-13665 // BID: 62879 // JVNDB: JVNDB-2013-006839 // NVD: CVE-2013-2805

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-2805
value: HIGH

Trust: 1.0

NVD: CVE-2013-2805
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-13665
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201310-255
value: HIGH

Trust: 0.6

IVD: 017bbdee-2353-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

VULHUB: VHN-62807
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-2805
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-13665
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 017bbdee-2353-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-62807
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2013-2805
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: IVD: 017bbdee-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-13665 // VULHUB: VHN-62807 // JVNDB: JVNDB-2013-006839 // CNNVD: CNNVD-201310-255 // NVD: CVE-2013-2805

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.9

sources: VULHUB: VHN-62807 // JVNDB: JVNDB-2013-006839 // NVD: CVE-2013-2805

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201310-255

TYPE

Buffer error

Trust: 0.8

sources: IVD: 017bbdee-2353-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201310-255

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-006839

PATCH

title:Top Pageurl:https://www.rockwellautomation.com/

Trust: 0.8

title:RSLinx Enterprise 'LogReceiver.exe' Patch for Cross-Border Remote Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/40135

Trust: 0.6

sources: CNVD: CNVD-2013-13665 // JVNDB: JVNDB-2013-006839

EXTERNAL IDS

db:NVDid:CVE-2013-2805

Trust: 3.6

db:ICS CERTid:ICSA-13-095-02

Trust: 2.5

db:BIDid:62879

Trust: 1.0

db:CNNVDid:CNNVD-201310-255

Trust: 0.9

db:ICS CERTid:ICSA-13-095-02A

Trust: 0.9

db:CNVDid:CNVD-2013-13665

Trust: 0.8

db:JVNDBid:JVNDB-2013-006839

Trust: 0.8

db:IVDid:017BBDEE-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-62807

Trust: 0.1

sources: IVD: 017bbdee-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-13665 // VULHUB: VHN-62807 // BID: 62879 // JVNDB: JVNDB-2013-006839 // CNNVD: CNNVD-201310-255 // NVD: CVE-2013-2805

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-13-095-02

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2013-2805

Trust: 1.4

url:http://ics-cert.us-cert.gov/advisories/icsa-13-095-02a

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2805

Trust: 0.8

url:http://www.rockwellautomation.com/

Trust: 0.3

url:http://www.rockwellautomation.com/rockwellsoftware/design/rslinx/

Trust: 0.3

sources: CNVD: CNVD-2013-13665 // VULHUB: VHN-62807 // BID: 62879 // JVNDB: JVNDB-2013-006839 // CNNVD: CNNVD-201310-255 // NVD: CVE-2013-2805

CREDITS

Carsten Eiram of Risk Based Security.

Trust: 0.9

sources: BID: 62879 // CNNVD: CNNVD-201310-255

SOURCES

db:IVDid:017bbdee-2353-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2013-13665
db:VULHUBid:VHN-62807
db:BIDid:62879
db:JVNDBid:JVNDB-2013-006839
db:CNNVDid:CNNVD-201310-255
db:NVDid:CVE-2013-2805

LAST UPDATE DATE

2024-08-14T14:06:48.583000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-13665date:2013-10-12T00:00:00
db:VULHUBid:VHN-62807date:2020-02-10T00:00:00
db:BIDid:62879date:2013-10-07T00:00:00
db:JVNDBid:JVNDB-2013-006839date:2019-05-09T00:00:00
db:CNNVDid:CNNVD-201310-255date:2020-02-13T00:00:00
db:NVDid:CVE-2013-2805date:2020-02-10T21:24:37.467

SOURCES RELEASE DATE

db:IVDid:017bbdee-2353-11e6-abef-000c29c66e3ddate:2013-10-12T00:00:00
db:CNVDid:CNVD-2013-13665date:2013-10-12T00:00:00
db:VULHUBid:VHN-62807date:2019-03-26T00:00:00
db:BIDid:62879date:2013-10-07T00:00:00
db:JVNDBid:JVNDB-2013-006839date:2019-05-09T00:00:00
db:CNNVDid:CNNVD-201310-255date:2013-10-17T00:00:00
db:NVDid:CVE-2013-2805date:2019-03-26T18:29:00.310