HIGH · 9.3

CVE-2013-0662

Multiple stack-based buffer overflows in ModbusDrv.exe in Schneider Electric Modbus Serial Driver 1.10 through 3.2 allow remote attackers to execute arbitrary code via a large buffer-size value in a M...

Vulnerability Description

Multiple stack-based buffer overflows in ModbusDrv.exe in Schneider Electric Modbus Serial Driver 1.10 through 3.2 allow remote attackers to execute arbitrary code via a large buffer-size value in a Modbus Application Header.

CVSS Score

9.3

HIGH

AV:N/AC:M/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
Schneider-ElectricConcept<= 2.6
Schneider-ElectricModbus Serial Driver1.10
Schneider-ElectricModbuscommdtm Sl<= 2.1.2
Schneider-ElectricOpc Factory Server<= 3.5.0
Schneider-ElectricPl7<= 4.5
Schneider-ElectricPowersuite<= 2.6
Schneider-ElectricSft2841<= 14.0
Schneider-ElectricSomachine<= 3.1
Schneider-ElectricSomove<= 1.7
Schneider-ElectricTwidosuite<= 2.31.04
Schneider-ElectricUnity Pro<= 7.0
Schneider-ElectricUnityloader<= 2.3
Schneider ElectricSomachine3.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-0662?

CVE-2013-0662 is a vulnerability with a CVSS score of 9.3 (HIGH). Multiple stack-based buffer overflows in ModbusDrv.exe in Schneider Electric Modbus Serial Driver 1.10 through 3.2 allow remote attackers to execute arbitrary code via a large buffer-size value in a M...

How severe is CVE-2013-0662?

CVE-2013-0662 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2013-0662?

Check the references section above for vendor advisories and patch information. Affected products include: Schneider-Electric Concept, Schneider-Electric Modbus Serial Driver, Schneider-Electric Modbuscommdtm Sl, Schneider-Electric Opc Factory Server, Schneider-Electric Pl7.