CVE-2013-2804
Published Aug 28, 2013
Last updated 11 years ago
Overview
- Description
- The DNP Master Driver in Software Toolbox TOP Server before 5.12.140.0 allows remote attackers to cause a denial of service (master-station infinite loop) via crafted DNP3 packets to TCP port 20000 and allows physically proximate attackers to cause a denial of service (master-station infinite loop) via crafted input over a serial line.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.1
- Impact score
- 6.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:softwaretoolbox:top_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AF2BD70-67A5-4F61-94C5-0863121BD4AE", "versionEndIncluding": "5.12" }, { "criteria": "cpe:2.3:a:softwaretoolbox:top_server:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A0DF1E6-F0BE-4285-8CCC-00F6223257BE" }, { "criteria": "cpe:2.3:a:softwaretoolbox:top_server:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D27D453-CFD9-4EFB-AEC7-AFAEC9C3696C" }, { "criteria": "cpe:2.3:a:softwaretoolbox:top_server:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE242188-C190-4CD0-9DF9-7E670B29F28D" }, { "criteria": "cpe:2.3:a:softwaretoolbox:top_server:5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2ADA4AA4-7D03-4352-8E1D-92AA55CE2F9A" }, { "criteria": "cpe:2.3:a:softwaretoolbox:top_server:5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1DDBDA3-BC3D-4C04-B5F7-381AA5102431" }, { "criteria": "cpe:2.3:a:softwaretoolbox:top_server:5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E39D751D-0D5E-4189-89B0-B3AF5545FEE1" }, { "criteria": "cpe:2.3:a:softwaretoolbox:top_server:5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E12CE9C-3117-41D9-8C4A-3338966A0682" }, { "criteria": "cpe:2.3:a:softwaretoolbox:top_server:5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5730D480-BD66-40F1-8DB1-AAC4136A815C" }, { "criteria": "cpe:2.3:a:softwaretoolbox:top_server:5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB70DE6A-334B-4AD8-BD28-6D4107DEA437" }, { "criteria": "cpe:2.3:a:softwaretoolbox:top_server:5.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23E076D2-A342-4EB9-9A4D-E0CC7D48B7F1" }, { "criteria": "cpe:2.3:a:softwaretoolbox:top_server:5.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CA6C424-0FD2-49EA-9B1D-43A2930734B1" }, { "criteria": "cpe:2.3:a:softwaretoolbox:top_server:5.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9FBE9B6-C93C-43E4-B3F0-78C0A59288FC" } ], "operator": "OR" } ] } ]