CVE-2013-0662

CVSS V2 High 9.3 CVSS V3 None
Description
Multiple stack-based buffer overflows in ModbusDrv.exe in Schneider Electric Modbus Serial Driver 1.10 through 3.2 allow remote attackers to execute arbitrary code via a large buffer-size value in a Modbus Application Header.
Overview
  • CVE ID
  • CVE-2013-0662
  • Assigner
  • ics-cert@hq.dhs.gov
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2014-04-01T06:17:08
  • Last Modified Date
  • 2022-02-03T13:57:57
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:schneider-electric:concept:*:sr7:*:*:*:*:*:* 1 OR 2.6
cpe:2.3:a:schneider-electric:modbus_serial_driver:1.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:schneider-electric:modbus_serial_driver:2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:schneider-electric:modbus_serial_driver:3.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:schneider-electric:modbuscommdtm_sl:*:*:*:*:*:*:*:* 1 OR 2.1.2
cpe:2.3:a:schneider-electric:opc_factory_server:*:*:*:*:*:*:*:* 1 OR 3.5.0
cpe:2.3:a:schneider-electric:opc_factory_server:3.34:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:schneider-electric:opc_factory_server:3.35:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:schneider-electric:pl7:*:sp7:*:*:*:*:*:* 1 OR 4.5
cpe:2.3:a:schneider-electric:powersuite:*:*:*:*:*:*:*:* 1 OR 2.6
cpe:2.3:a:schneider-electric:sft2841:*:*:*:*:*:*:*:* 1 OR 14.0
cpe:2.3:a:schneider-electric:sft2841:13.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:schneider-electric:somachine:*:*:*:*:*:*:*:* 1 OR 3.1
cpe:2.3:a:schneider-electric:somachine:2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:schneider-electric:somachine:3.0:-:*:*:*:*:*:* 1 OR
cpe:2.3:a:schneider-electric:somove:*:*:*:*:*:*:*:* 1 OR 1.7
cpe:2.3:a:schneider-electric:twidosuite:*:*:*:*:*:*:*:* 1 OR 2.31.04
cpe:2.3:a:schneider-electric:unity_pro:*:*:*:*:*:*:*:* 1 OR 7.0
cpe:2.3:a:schneider-electric:unity_pro:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:schneider-electric:unityloader:*:*:*:*:*:*:*:* 1 OR 2.3
cpe:2.3:a:schneider_electric:somachine:3.0:*:*:*:xs:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 9.3
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 10
References
Reference URL Reference Tags
http://ics-cert.us-cert.gov/advisories/ICSA-14-086-01 Mitigation Third Party Advisory US Government Resource
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202013-070-01 Vendor Advisory
http://www.securityfocus.com/bid/66500 Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/45220/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/45219/ Exploit Third Party Advisory VDB Entry
History
Created Old Value New Value Data Type Notes
2022-05-10 06:34:36 Added to TrackCVE
2022-12-01 22:30:11 2014-04-01T06:17Z 2014-04-01T06:17:08 CVE Published Date updated
2022-12-01 22:30:11 2022-02-03T13:57:57 CVE Modified Date updated
2022-12-01 22:30:11 Analyzed Vulnerability Status updated