First published: Thu Jun 05 2014(Updated: )
COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow remote attackers to cause a denial of service (infinite loop and process crash) by sending a crafted DNP3 packet over TCP.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Copadata Zenon | =7.10 | |
Copadata Zenon | =7.11 | |
Copadata Zenon | =7.11-sp0_build_10238 | |
Copadata Zenon | =7.11-sp0_build_10238 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2345 has a medium severity rating as it can cause a denial of service.
To fix CVE-2014-2345, upgrade to zenon DNP3 NG driver 7.11 SP1 or later.
CVE-2014-2345 exploits vulnerabilities in the DNP3 protocol, leading to an infinite loop and process crash.
CVE-2014-2345 affects users of COPA-DATA zenon DNP3 NG driver versions 7.10, 7.11, and zenon DNP3 Process Gateway 7.11 SP0 build 10238 and earlier.
CVE-2014-2345 can lead to remote denial of service, causing systems to become unresponsive.