Show plain JSON{"id": "CVE-2012-4715", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-04-18T11:33:02.067", "references": [{"url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-095-02.pdf", "tags": ["US Government Resource"], "source": "ics-cert@hq.dhs.gov"}, {"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599", "source": "ics-cert@hq.dhs.gov"}, {"url": "http://ics-cert.us-cert.gov/pdf/ICSA-13-095-02.pdf", "tags": ["US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Buffer overflow in LogReceiver.exe in Rockwell Automation RSLinx Enterprise CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a UDP packet with a certain integer length value that is (1) too large or (2) too small, leading to improper handling by Logger.dll."}, {"lang": "es", "value": "Un desbordamiento de b\u00fafer en el archivo LogReceiver.exe en RSLinx Enterprise de Rockwell Automation versiones CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1 y CPR9-SR6, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio) o posiblemente ejecutar c\u00f3digo arbitrario por medio de un paquete UDP con un cierto valor de longitud de entero que es (1) demasiado grande o (2) demasiado peque\u00f1o, conllevando a un manejo inapropiado por parte de la biblioteca Logger.dll."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:rockwellautomation:rslinx_enterprise:cpr9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E175F9C-864E-47A9-B86F-68CB8E62273E"}, {"criteria": "cpe:2.3:h:rockwellautomation:rslinx_enterprise:cpr9:sr1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35E07706-2CFF-4E29-9682-AF627181789C"}, {"criteria": "cpe:2.3:h:rockwellautomation:rslinx_enterprise:cpr9:sr2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C43F1DB-8C69-4568-BA2B-9524727DBA5D"}, {"criteria": "cpe:2.3:h:rockwellautomation:rslinx_enterprise:cpr9:sr3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A49F11FD-8C9B-4704-BC2D-CCF31F818A44"}, {"criteria": "cpe:2.3:h:rockwellautomation:rslinx_enterprise:cpr9:sr4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02C21A5D-AA9A-4845-81AB-8C884F1C419A"}, {"criteria": "cpe:2.3:h:rockwellautomation:rslinx_enterprise:cpr9:sr5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60D852E9-0438-489B-9B36-D8768F659770"}, {"criteria": "cpe:2.3:h:rockwellautomation:rslinx_enterprise:cpr9:sr5.1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23C9AD76-9094-44BB-8B57-9631FEAE3CB3"}, {"criteria": "cpe:2.3:h:rockwellautomation:rslinx_enterprise:cpr9:sr6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "670C0268-B3B3-4216-A9B1-AC9423B19DD6"}], "operator": "OR"}]}], "sourceIdentifier": "ics-cert@hq.dhs.gov"}