First published: Mon Sep 09 2013(Updated: )
Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616, DNP3 .NET Protocol components 3.06.0.171 through 3.15.0.369, and DNP3 C libraries 3.06.0000 through 3.15.0000 allow remote attackers to cause a denial of service (infinite loop) via a crafted DNP3 TCP packet.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Triangle Microworks .NET Communication Protocol Components | =3.06.0.171 | |
Triangle Microworks .NET Communication Protocol Components | =3.15.0.369 | |
Trianglemicroworks Ansi C Source Code Libraries | =3.06.0000 | |
Trianglemicroworks Ansi C Source Code Libraries | =3.15.0000 | |
Triangle MicroWorks SCADA Data Gateway | =2.50 | |
Triangle MicroWorks SCADA Data Gateway | =2.50.0309 | |
Triangle MicroWorks SCADA Data Gateway | =3.00.0616 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2793 is classified as a denial of service vulnerability.
To fix CVE-2013-2793, update Triangle MicroWorks SCADA Data Gateway, DNP3 .NET Protocol components, and DNP3 C libraries to their latest versions.
CVE-2013-2793 affects Triangle MicroWorks SCADA Data Gateway and various DNP3 protocol components and libraries.
Exploiting CVE-2013-2793 can cause an infinite loop leading to denial of service.
Versions from Triangle MicroWorks SCADA Data Gateway 2.50.0309 through 3.00.0616 and specific DNP3 protocol components are vulnerable to CVE-2013-2793.