CoDeSys Gateway Service < 2.3.9.28 Use-After-Free

Critical Nessus Plugin ID 66805

Synopsis

The remote host is running a SCADA data gateway service that is affected by a use-after-free vulnerability.

Description

The remote host is running a version of CoDeSys Gateway Service prior to version 2.3.9.28. It is, therefore, affected by a use-after-free vulnerability that can be triggered by sending specially crafted packets to the CoDeSys Gateway service listening on port 1211. Successful exploitation may allow arbitrary code execution or result in a denial of service condition.

Solution

Upgrade CoDeSys Gateway to version 2.3.9.28

See Also

https://www.codesys.com/download.html

Plugin Details

Severity: Critical

ID: 66805

File Name: scada_codesys_gateway_2_3_9_28.nbin

Version: 1.33

Type: remote

Family: SCADA

Published: 2013/06/05

Modified: 2019/01/09

Dependencies: 65193

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:3s-software:codesys_gateway-server

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/04/18

Vulnerability Publication Date: 2013/05/22

Reference Information

CVE: CVE-2013-2781

BID: 60088

ICSA: 13-142-01