The GPT library in the Telegyr 8979 Master Protocol application in SUBNET SubSTATION Server 2 before SSNET 2.12 HF18808 allows remote attackers to cause a denial of service (persistent service crash) via a long RTU-to-Master message.
Fixes

Solution

SUBNET has produced hot fix “SSNET v2.12 HF18808” to resolve this issue. This hot fix can be obtained by secure FTP provided by the SUBNET support department. Please contact SUBNET Customer Support at: (403) 270-8885, or by email at: support@SUBNET.com and reference SUBNET Release Bulletin “SubSTATION Server 2.12 HF18808 Release, 21 May 2014” for a copy of this release bulletin and download/installation information (This bulletin is being sent to registered users only). Vendor Recommendation: * The exploit results in an unrecoverable exception, but all software components are registered as Services under Windows and can be configured to automatically restart after any stoppage. Users can configure the service to automatically restart, which limits the DoS to a momentary disruption. * Backward compatible releases will be available by request for customers using older versions of SubSTATION Server.


Workaround

No workaround given by the vendor.

History

Fri, 03 Oct 2025 17:30:00 +0000

Type Values Removed Values Added
Title SUBNET SubSTATION Server 2 Telegyr 8979 Master Protocol Improper Input Validation
Weaknesses CWE-20
References
Metrics cvssV2_0

{'score': 7.1, 'vector': 'AV:N/AC:M/Au:N/C:N/I:N/A:C'}

cvssV2_0

{'score': 8.3, 'vector': 'AV:A/AC:L/Au:N/C:C/I:C/A:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-10-03T17:14:03.235Z

Reserved: 2014-03-13T00:00:00

Link: CVE-2014-2357

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-08-11T22:55:04.210

Modified: 2025-10-03T18:15:33.907

Link: CVE-2014-2357

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.