CVE-2015-8299

Buffer overflow in the Group messages monitor (Falcon) in KNX ETS 4.1.5 (Build 3246) allows remote attackers to execute arbitrary code via a crafted KNXnet/IP UDP packet.
Configurations

Configuration 1 (hide)

cpe:2.3:a:knx:ets:4.1.5:*:*:*:*:*:*:*

History

21 Nov 2024, 02:38

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/134524/KNX-ETS-4.1.5-Build-3246-Buffer-Overflow.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/134524/KNX-ETS-4.1.5-Build-3246-Buffer-Overflow.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/sbaresearch/advisories/tree/public/2015/knAx_20150101 - Exploit, Third Party Advisory () https://github.com/sbaresearch/advisories/tree/public/2015/knAx_20150101 - Exploit, Third Party Advisory

Information

Published : 2017-08-29 15:29

Updated : 2024-11-21 02:38


NVD link : CVE-2015-8299

Mitre link : CVE-2015-8299

CVE.ORG link : CVE-2015-8299


JSON object : View

Products Affected

knx

  • ets
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer