{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"SubSTATION Server 2 Telegyr 8979 Master Protocol","vendor":"SUBNET","versions":[{"status":"affected","version":"all versions"}]}],"credits":[{"lang":"en","type":"finder","value":"Adam Crain of Automatak and Chris Sistrunk of Mandiant"}],"datePublic":"2014-07-31T06:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>The GPT library in the Telegyr 8979 Master Protocol application in SUBNET SubSTATION Server 2 before SSNET 2.12 HF18808 allows remote attackers to cause a denial of service (persistent service crash) via a long RTU-to-Master message.</p>"}],"value":"The GPT library in the Telegyr 8979 Master Protocol application in SUBNET SubSTATION Server 2 before SSNET 2.12 HF18808 allows remote attackers to cause a denial of service (persistent service crash) via a long RTU-to-Master message."}],"metrics":[{"cvssV2_0":{"accessComplexity":"LOW","accessVector":"ADJACENT_NETWORK","authentication":"NONE","availabilityImpact":"COMPLETE","baseScore":8.3,"confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","vectorString":"AV:A/AC:L/Au:N/C:C/I:C/A:C","version":"2.0"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2025-10-03T17:14:03.235Z"},"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-14-196-01"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>SUBNET has produced hot fix “SSNET v2.12 HF18808” to resolve this issue.</p><p>This hot fix can be obtained by secure FTP provided by the SUBNET \nsupport department. Please contact SUBNET Customer Support at: (403) \n270-8885, or by email at: <a target=\"_blank\" rel=\"nofollow\">support@SUBNET.com&nbsp;</a>and reference SUBNET Release Bulletin “SubSTATION Server 2.12 HF18808 \nRelease, 21  May 2014” for a copy of this release bulletin and \ndownload/installation information (This bulletin is being sent to \nregistered users only).</p>\n<p>Vendor Recommendation:</p>\n<ul>\n<li>The exploit results in an unrecoverable exception, but all software \ncomponents are registered as Services under Windows and can be \nconfigured to automatically restart after any stoppage. Users can \nconfigure the service to automatically restart, which limits the DoS to a\n momentary disruption.</li>\n<li>Backward compatible releases will be available by request for customers using older versions of SubSTATION Server.</li>\n</ul>\n\n<br>"}],"value":"SUBNET has produced hot fix “SSNET v2.12 HF18808” to resolve this issue.\n\nThis hot fix can be obtained by secure FTP provided by the SUBNET \nsupport department. Please contact SUBNET Customer Support at: (403) \n270-8885, or by email at: support@SUBNET.com and reference SUBNET Release Bulletin “SubSTATION Server 2.12 HF18808 \nRelease, 21  May 2014” for a copy of this release bulletin and \ndownload/installation information (This bulletin is being sent to \nregistered users only).\n\n\nVendor Recommendation:\n\n\n\n  *  The exploit results in an unrecoverable exception, but all software \ncomponents are registered as Services under Windows and can be \nconfigured to automatically restart after any stoppage. Users can \nconfigure the service to automatically restart, which limits the DoS to a\n momentary disruption.\n\n  *  Backward compatible releases will be available by request for customers using older versions of SubSTATION Server."}],"source":{"advisory":"ICSA-14-196-01","discovery":"EXTERNAL"},"title":"SUBNET SubSTATION Server 2 Telegyr 8979 Master Protocol Improper Input Validation","x_generator":{"engine":"Vulnogram 0.2.0"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","ID":"CVE-2014-2357","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The GPT library in the Telegyr 8979 Master Protocol application in SUBNET SubSTATION Server 2 before SSNET 2.12 HF18808 allows remote attackers to cause a denial of service (persistent service crash) via a long RTU-to-Master message."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://ics-cert.us-cert.gov/advisories/ICSA-14-196-01","refsource":"MISC","url":"https://ics-cert.us-cert.gov/advisories/ICSA-14-196-01"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T10:14:25.268Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://ics-cert.us-cert.gov/advisories/ICSA-14-196-01"}]}]},"cveMetadata":{"assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","assignerShortName":"icscert","cveId":"CVE-2014-2357","datePublished":"2014-08-11T22:00:00.000Z","dateReserved":"2014-03-13T00:00:00.000Z","dateUpdated":"2025-10-03T17:14:03.235Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}