A DNS client stack-based buffer overflow in ipdnsc_decode_name() affects Wind River VxWorks 6.5 through 7. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Link | Resource |
---|---|
https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/ | Exploit Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-553445.pdf | Third Party Advisory |
https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/ | Exploit Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-553445.pdf | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
No history.
Information
Published : 2021-03-11 22:15
Updated : 2024-11-21 02:47
NVD link : CVE-2016-20009
Mitre link : CVE-2016-20009
CVE.ORG link : CVE-2016-20009
JSON object : View
Products Affected
windriver
- vxworks
siemens
- sgt-200_firmware
- sgt-200
- sgt-a35_firmware
- sgt-a35
- sgt-300_firmware
- sgt-100
- sgt-400_firmware
- sgt-400
- sgt-a65
- sgt-a65_firmware
- sgt-300
- sgt-a20
- sgt-a20_firmware
- sgt-100_firmware
CWE
CWE-787
Out-of-bounds Write