Stack-based buffer overflow when parsing HTTP POST requests in IMS-LANTIME M3000



Published: 2016-06-29 | Updated: 2020-04-07
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2016-3962
CWE-ID CWE-119
CWE-425
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
IMS-LANTIME M1000
Other software / Other software solutions

IMS-LANTIME M500
Other software / Other software solutions

LANTIME M900
Other software / Other software solutions

LANTIME M600
Other software / Other software solutions

LANTIME M400
Other software / Other software solutions

LANTIME M300
Other software / Other software solutions

LANTIME M200
Other software / Other software solutions

LANTIME M100
Other software / Other software solutions

SyncFire 1100
Other software / Other software solutions

LCES
Other software / Other software solutions

Vendor Meinberg radio clocks GmbH & Co. KG

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Stack-based buffer overflow when parsing HTTP POST requests

EUVDB-ID: #VU55

Risk: High

CVSSv3.1: 8.9 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2016-3962

CWE-ID: CWE-119 - Memory corruption

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when parsing certain parameter in HTTP POST request. A remote attacker can trigger stack-based buffer overflow and execute arbitrary code on vulnerable system with privileges of the web server (system account "nobody").

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Meinberg has produced a new firmware Version 6.20.004.

Vulnerable software versions

IMS-LANTIME M1000: 6.0

IMS-LANTIME M500: 6.0

LANTIME M900 : 6.0

LANTIME M600 : 6.0

LANTIME M400: 6.0

LANTIME M300: 6.0

LANTIME M200: 6.0

LANTIME M100: 6.0

SyncFire 1100: 6.0

LCES: 6.0

External links

http://ics-cert.us-cert.gov/advisories/ICSA-16-175-03


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###