CVE-2013-2806
Summary
| CVE | CVE-2013-2806 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-03-26 17:29:00 UTC |
| Updated | 2020-02-10 21:24:00 UTC |
| Description | Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the “End of Current Record” field. By sending a datagram to the service over Port 4444/UDP with the “Record Data Size” field modified to a specifically oversized value, the service will calculate an undersized value for the “Total Record Size.” Then the service will calculate an incorrect value for the “End of Current Record” field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599 |
Risk And Classification
Problem Types: CWE-190
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Rockwellautomation | Rslinx Enterprise | 5.10.00 | All | All | All |
| Application | Rockwellautomation | Rslinx Enterprise | 5.10.01 | All | All | All |
| Application | Rockwellautomation | Rslinx Enterprise | 5.20.00 | All | All | All |
| Application | Rockwellautomation | Rslinx Enterprise | 5.21.00 | All | All | All |
| Application | Rockwellautomation | Rslinx Enterprise | 5.30.00 | All | All | All |
| Application | Rockwellautomation | Rslinx Enterprise | 5.40.00 | All | All | All |
| Application | Rockwellautomation | Rslinx Enterprise | 5.50.00 | All | All | All |
| Application | Rockwellautomation | Rslinx Enterprise | 5.51.00 | All | All | All |
| Application | Rockwellautomation | Rslinx Enterprise | 5.60.00 | All | All | All |
| Application | Rockwellautomation | Rslinx Enterprise | 5.10.00 | All | All | All |
| Application | Rockwellautomation | Rslinx Enterprise | 5.10.01 | All | All | All |
| Application | Rockwellautomation | Rslinx Enterprise | 5.20.00 | All | All | All |
| Application | Rockwellautomation | Rslinx Enterprise | 5.21.00 | All | All | All |
| Application | Rockwellautomation | Rslinx Enterprise | 5.30.00 | All | All | All |
| Application | Rockwellautomation | Rslinx Enterprise | 5.40.00 | All | All | All |
| Application | Rockwellautomation | Rslinx Enterprise | 5.50.00 | All | All | All |
| Application | Rockwellautomation | Rslinx Enterprise | 5.51.00 | All | All | All |
| Application | Rockwellautomation | Rslinx Enterprise | 5.60.00 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Rockwell Automation FactoryTalk and RSLinx Vulnerabilities (Update A) | ICS-CERT | MISC | ics-cert.us-cert.gov | Third Party Advisory, US Government Resource |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.