BACnet Protocol Stack through 0.8.6 has a segmentation fault leading to denial of service in BACnet APDU Layer because a malformed DCC in AtomicWriteFile, AtomicReadFile and DeviceCommunicationControl services. An unauthenticated remote attacker could cause a denial of service (bacserv daemon crash) because there is an invalid read in bacdcode.c during parsing of alarm tag numbers.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/153716/BACnet-Stack-0.8.6-Denial-Of-Service.html - | |
References | () https://1modm.github.io/CVE-2019-12480.html - | |
References | () https://sourceforge.net/p/bacnet/bugs/62/ - Exploit, Third Party Advisory | |
References | () https://sourceforge.net/p/bacnet/code/3220 - | |
References | () https://sourceforge.net/p/bacnet/code/3223 - | |
References | () https://sourceforge.net/p/bacnet/code/3224 - | |
References | () https://sourceforge.net/p/bacnet/code/3225 - |
Information
Published : 2019-05-30 22:29
Updated : 2024-11-21 04:22
NVD link : CVE-2019-12480
Mitre link : CVE-2019-12480
CVE.ORG link : CVE-2019-12480
JSON object : View
Products Affected
bacnet_protocol_stack_project
- bacnet_protocol_stack
CWE
CWE-125
Out-of-bounds Read