A DNS client stack-based buffer overflow in ipdnsc_decode_name() affects Wind River VxWorks 6.5 through 7. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Link | Resource |
---|---|
https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/ | Exploit Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-553445.pdf | Third Party Advisory |
https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/ | Exploit Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-553445.pdf | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
21 Nov 2024, 02:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/ - Exploit, Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-553445.pdf - Third Party Advisory |
07 Nov 2023, 02:30
Type | Values Removed | Values Added |
---|---|---|
Summary | A DNS client stack-based buffer overflow in ipdnsc_decode_name() affects Wind River VxWorks 6.5 through 7. NOTE: This vulnerability only affects products that are no longer supported by the maintainer |
Information
Published : 2021-03-11 22:15
Updated : 2024-11-21 02:47
NVD link : CVE-2016-20009
Mitre link : CVE-2016-20009
CVE.ORG link : CVE-2016-20009
JSON object : View
Products Affected
siemens
- sgt-100
- sgt-200_firmware
- sgt-400
- sgt-100_firmware
- sgt-a20
- sgt-a65
- sgt-200
- sgt-300_firmware
- sgt-400_firmware
- sgt-a65_firmware
- sgt-a35
- sgt-a35_firmware
- sgt-a20_firmware
- sgt-300
windriver
- vxworks
CWE
CWE-787
Out-of-bounds Write