ID

VAR-201311-0064


CVE

CVE-2013-2811


TITLE

GE Intelligent Platforms Used in products Catapult and GE Intelligent Platforms Proficy of DNP3 I/O Service disruption in drivers (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-005225

DESCRIPTION

The (1) Catapult DNP3 I/O driver before 7.2.0.60 and the (2) GE Intelligent Platforms Proficy DNP3 I/O driver before 7.20k, as used in DNPDrv.exe (aka the DNP master station server) in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY and iFIX, allow remote attackers to cause a denial of service (infinite loop) via a crafted DNP3 TCP packet. Catapult Software DNP3 Driver is a power-related industrial control software. Attackers can exploit this issue to force the application to enter into an infinite loop, causing denial-of-service conditions

Trust: 2.61

sources: NVD: CVE-2013-2811 // JVNDB: JVNDB-2013-005225 // CNVD: CNVD-2013-14629 // BID: 63811 // IVD: 75ec4cf8-2352-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 75ec4cf8-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-14629

AFFECTED PRODUCTS

vendor:intelligent platforms proficy dnp3 i o drivermodel: - scope:eqversion:7.20

Trust: 2.0

vendor:gemodel:intelligent platforms proficy dnp3 i\/o driverscope:eqversion:7.20

Trust: 1.6

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:8.0

Trust: 1.0

vendor:gemodel:intelligent platforms proficy hmi\/scada ifixscope:eqversion:5.1

Trust: 1.0

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:7.5

Trust: 1.0

vendor:gemodel:intelligent platforms proficy hmi\/scada ifixscope:eqversion:5.0

Trust: 1.0

vendor:catapultsoftwaremodel:catapult dnp3 i\/o driverscope:lteversion:7.20.56

Trust: 1.0

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:4.01

Trust: 1.0

vendor:gemodel:intelligent platforms proficy dnp3 i\/o driverscope:lteversion:7.20

Trust: 1.0

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:8.2

Trust: 1.0

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:8.1

Trust: 1.0

vendor:catapultmodel:dnp3 driverscope:ltversion:7.2.0.60

Trust: 0.8

vendor:general electricmodel:proficy hmi/scada - cimplicityscope:eqversion:8.1 thats all

Trust: 0.8

vendor:general electricmodel:proficy hmi/scada - ifixscope:eqversion:4.0 thats all

Trust: 0.8

vendor:general electricmodel:proficy hmi/scada dnp3 i/o driverscope:ltversion:7.20k

Trust: 0.8

vendor:catapultmodel:software dnp3 i/o driverscope:eqversion:7.x

Trust: 0.6

vendor:generalmodel:electric proficy hmi/scada-ifixscope:eqversion:5.5

Trust: 0.3

vendor:generalmodel:electric proficy hmi/scada-ifixscope:eqversion:5.1

Trust: 0.3

vendor:generalmodel:electric proficy hmi/scada-ifixscope:eqversion:5.0

Trust: 0.3

vendor:catapult dnp3 i o drivermodel: - scope:eqversion:*

Trust: 0.2

vendor:intelligent platforms proficy dnp3 i o drivermodel: - scope:eqversion:*

Trust: 0.2

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:4.01

Trust: 0.2

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:7.5

Trust: 0.2

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:8.0

Trust: 0.2

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:8.1

Trust: 0.2

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:8.2

Trust: 0.2

vendor:intelligent platforms proficy hmi scada ifixmodel: - scope:eqversion:5.0

Trust: 0.2

vendor:intelligent platforms proficy hmi scada ifixmodel: - scope:eqversion:5.1

Trust: 0.2

sources: IVD: 75ec4cf8-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-14629 // BID: 63811 // JVNDB: JVNDB-2013-005225 // CNNVD: CNNVD-201311-334 // NVD: CVE-2013-2811

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-2811
value: HIGH

Trust: 1.0

NVD: CVE-2013-2811
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-14629
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201311-334
value: HIGH

Trust: 0.6

IVD: 75ec4cf8-2352-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2013-2811
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-14629
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 75ec4cf8-2352-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 75ec4cf8-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-14629 // JVNDB: JVNDB-2013-005225 // CNNVD: CNNVD-201311-334 // NVD: CVE-2013-2811

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2013-005225 // NVD: CVE-2013-2811

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201311-334

TYPE

Input validation

Trust: 0.8

sources: IVD: 75ec4cf8-2352-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201311-334

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-005225

PATCH

title:DNP3url:http://www.catapultsoftware.com/product?id=625027c2-709e-47a2-bfe2-7f5efa38b51f

Trust: 0.8

title:KB15805url:http://support.ge-ip.com/support/index?page=kbchannel&id=S:KB15805

Trust: 0.8

title:GEIP13-04url:http://support.ge-ip.com/support/resources/sites/GE_FANUC_SUPPORT/content/live/KB/15000/KB15805/en_US/GEIP13-04%20Security%20Advisory%20-%20Proficy%20HMI%20SCADA%20DNP3%20Driver%20from%20Catapult%20Software.pdf

Trust: 0.8

title:Catapult Software DNP3 Driver TCP Packet Handling Remote Denial of Service Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/41210

Trust: 0.6

title:CatapultDNP_v7.20.61.4url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=48493

Trust: 0.6

sources: CNVD: CNVD-2013-14629 // JVNDB: JVNDB-2013-005225 // CNNVD: CNNVD-201311-334

EXTERNAL IDS

db:NVDid:CVE-2013-2811

Trust: 3.5

db:ICS CERTid:ICSA-13-297-02

Trust: 3.0

db:ICS CERTid:ICSA-13-297-01

Trust: 2.4

db:BIDid:63811

Trust: 1.5

db:CNVDid:CNVD-2013-14629

Trust: 0.8

db:CNNVDid:CNNVD-201311-334

Trust: 0.8

db:ICS CERTid:ICSA-14-287-01

Trust: 0.8

db:JVNDBid:JVNDB-2013-005225

Trust: 0.8

db:NSFOCUSid:25362

Trust: 0.6

db:IVDid:75EC4CF8-2352-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: 75ec4cf8-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-14629 // BID: 63811 // JVNDB: JVNDB-2013-005225 // CNNVD: CNNVD-201311-334 // NVD: CVE-2013-2811

REFERENCES

url:http://ics-cert.us-cert.gov/advisories/icsa-13-297-02

Trust: 3.0

url:http://ics-cert.us-cert.gov/advisories/icsa-13-297-01

Trust: 2.4

url:http://support.ge-ip.com/support/resources/sites/ge_fanuc_support/content/live/kb/15000/kb15805/en_us/geip13-04%20security%20advisory%20-%20proficy%20hmi%20scada%20dnp3%20driver%20from%20catapult%20software.pdf

Trust: 1.6

url:http://support.ge-ip.com/support/index?page=kbchannel&id=s:kb15805

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2811

Trust: 0.8

url:https://ics-cert.us-cert.gov/advisories/icsa-14-287-01

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2811

Trust: 0.8

url:http://www.securityfocus.com/bid/63811

Trust: 0.6

url:http://www.nsfocus.net/vulndb/25362

Trust: 0.6

sources: CNVD: CNVD-2013-14629 // JVNDB: JVNDB-2013-005225 // CNNVD: CNNVD-201311-334 // NVD: CVE-2013-2811

CREDITS

Adam Crain of Automatak and Chris Sistrunk

Trust: 0.9

sources: BID: 63811 // CNNVD: CNNVD-201311-334

SOURCES

db:IVDid:75ec4cf8-2352-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2013-14629
db:BIDid:63811
db:JVNDBid:JVNDB-2013-005225
db:CNNVDid:CNNVD-201311-334
db:NVDid:CVE-2013-2811

LAST UPDATE DATE

2024-08-14T14:40:24.984000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-14629date:2013-11-22T00:00:00
db:BIDid:63811date:2015-01-15T00:05:00
db:JVNDBid:JVNDB-2013-005225date:2015-01-14T00:00:00
db:CNNVDid:CNNVD-201311-334date:2013-11-29T00:00:00
db:NVDid:CVE-2013-2811date:2013-11-22T13:35:52.037

SOURCES RELEASE DATE

db:IVDid:75ec4cf8-2352-11e6-abef-000c29c66e3ddate:2013-11-22T00:00:00
db:CNVDid:CNVD-2013-14629date:2013-11-22T00:00:00
db:BIDid:63811date:2013-11-19T00:00:00
db:JVNDBid:JVNDB-2013-005225date:2013-11-25T00:00:00
db:CNNVDid:CNNVD-201311-334date:2013-11-22T00:00:00
db:NVDid:CVE-2013-2811date:2013-11-22T01:55:03.763