CVE-2014-5424 – Rockwell Automation Connected Components Workbench RA.ViewElements.Row.1 Arbitrary Write Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2014-5424
Rockwell Automation Connected Components Workbench (CCW) before 7.00.00 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an invalid property value to an ActiveX control that was built with an outdated compiler. Rockwell Automation Connected Components Workbench (CCW) anterior a 7.00.00 permite a atacantes remotos causar una denegación de servicio (caída de la aplicación) o la posibilidad de ejecutar código arbitrario a través de una propiedad inválida en el control del ActiveX que fue compilado con un compilador obsoleto. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Rockwell Automation Connected Components Workbench. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the RA.ViewElements.Row.1 ActiveXControl method. By providing a malicious value to the BackColor property, an attacker can write an uncontrolled four byte value to an arbitrary location. • https://ics-cert.us-cert.gov/advisories/ICSA-14-294-01 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2014-5410
https://notcve.org/view.php?id=CVE-2014-5410
The DNP3 feature on Rockwell Automation Allen-Bradley MicroLogix 1400 1766-Lxxxxx A FRN controllers 7 and earlier and 1400 1766-Lxxxxx B FRN controllers before 15.001 allows remote attackers to cause a denial of service (process disruption) via malformed packets over (1) an Ethernet network or (2) a serial line. La caracteristica DNP3 en los controladores Rockwell Automation Allen-Bradley MicroLogix 1400 1766-Lxxxxx A FRN 7 y anteriores y 1400 1766-Lxxxxx B FRN anterior a 15.001 permite a atacantes remotos causar una denegación de servicio (interrupción del proceso) a través de paquetes malformados sobre (1) una red Ethernet o (2) una línea de seriales. • https://ics-cert.us-cert.gov/advisories/ICSA-14-254-02 • CWE-399: Resource Management Errors •
CVE-2014-0755
https://notcve.org/view.php?id=CVE-2014-0755
Rockwell Automation RSLogix 5000 7 through 20.01, and 21.0, does not properly implement password protection for .ACD files (aka project files), which allows local users to obtain sensitive information or modify data via unspecified vectors. Rockwell Automation RSLogix 5000 7 hasta 20.01 y 21.0, no implementa debidamente la protección por contraseña de archivos .ACD (también conocidos como archivos de proyecto), lo cual permite a usuarios locales obtener información sensible o modificar datos a través de vectores no especificados. • http://ics-cert.us-cert.gov/advisories/ICSA-14-021-01 http://osvdb.org/102858 http://www.securityfocus.com/bid/65337 https://exchange.xforce.ibmcloud.com/vulnerabilities/90981 • CWE-255: Credentials Management Errors •
CVE-2012-4715
https://notcve.org/view.php?id=CVE-2012-4715
Buffer overflow in LogReceiver.exe in Rockwell Automation RSLinx Enterprise CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a UDP packet with a certain integer length value that is (1) too large or (2) too small, leading to improper handling by Logger.dll. Un desbordamiento de búfer en el archivo LogReceiver.exe en RSLinx Enterprise de Rockwell Automation versiones CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1 y CPR9-SR6, permite a los atacantes remotos causar una denegación de servicio (bloqueo del demonio) o posiblemente ejecutar código arbitrario por medio de un paquete UDP con un cierto valor de longitud de entero que es (1) demasiado grande o (2) demasiado pequeño, conllevando a un manejo inapropiado por parte de la biblioteca Logger.dll. • http://ics-cert.us-cert.gov/pdf/ICSA-13-095-02.pdf https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-4713
https://notcve.org/view.php?id=CVE-2012-4713
Integer signedness error in RNADiagnostics.dll in Rockwell Automation FactoryTalk Services Platform (FTSP) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 allows remote attackers to cause a denial of service (service outage or RNADiagReceiver.exe daemon crash) via UDP data that specifies a negative integer value. Error de signo Integer en RNADiagnostics.dll de Rockwell Automation FactoryTalk Services Platform (FTSP) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1 y CPR9-SR6 permite a atacantes remotos provocar una denegación de servicio (interrupción del servicio o la caída del demonio RNADiagReceiver.exe) a través de los datos de UDP que especifica un valor entero negativo. • http://ics-cert.us-cert.gov/pdf/ICSA-13-095-02.pdf https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599 • CWE-189: Numeric Errors •