Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2016-3962 |
CWE-ID | CWE-119 CWE-425 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software Subscribe |
IMS-LANTIME M1000 Other software / Other software solutions IMS-LANTIME M500 Other software / Other software solutions LANTIME M900 Other software / Other software solutions LANTIME M600 Other software / Other software solutions LANTIME M400 Other software / Other software solutions LANTIME M300 Other software / Other software solutions LANTIME M200 Other software / Other software solutions LANTIME M100 Other software / Other software solutions SyncFire 1100 Other software / Other software solutions LCES Other software / Other software solutions |
Vendor | Meinberg radio clocks GmbH & Co. KG |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU55
Risk: High
CVSSv3.1: 8.9 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2016-3962
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when parsing certain parameter in HTTP POST request. A remote attacker can trigger stack-based buffer overflow and execute arbitrary code on vulnerable system with privileges of the web server (system account "nobody").
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationMeinberg has produced a new firmware Version 6.20.004.
Vulnerable software versionsIMS-LANTIME M1000: 6.0
IMS-LANTIME M500: 6.0
LANTIME M900 : 6.0
LANTIME M600 : 6.0
LANTIME M400: 6.0
LANTIME M300: 6.0
LANTIME M200: 6.0
LANTIME M100: 6.0
SyncFire 1100: 6.0
LCES: 6.0
External linkshttp://ics-cert.us-cert.gov/advisories/ICSA-16-175-03
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.