Logic Error in Rockwell Automation RSLinx Enterprise Software Due to Input Handling Flaw
CVE-2013-2806
Summary
The RSLinx Enterprise Software from Rockwell Automation contains a vulnerability due to improper input handling in its LogReceiver.exe component. An attacker can exploit this vulnerability by sending a specially crafted datagram to the service over Port 4444/UDP. This manipulated datagram features an oversized 'Record Data Size', leading the software to miscalculate the 'Total Record Size' and the 'End of Current Record'. Such errors can cause access violations and eventually result in a service crash, which requires a manual reboot to recover the service. Users are encouraged to review the Rockwell Automation security advisory for detailed patch information.
Affected Version(s)
RSLinx Enterprise Software CPR9
RSLinx Enterprise Software CPR9-SR1
RSLinx Enterprise Software CPR9-SR2
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved