Multiple vulnerabilities in Cesanta Mongoose



Published: 2017-11-02
Risk High
Patch available YES
Number of vulnerabilities 8
CVE-ID CVE-2017-2891
CVE-2017-2892
CVE-2017-2893
CVE-2017-2894
CVE-2017-2895
CVE-2017-2909
CVE-2017-2921
CVE-2017-2922
CWE-ID CWE-416
CWE-20
CWE-476
CWE-121
CWE-125
CWE-835
CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Mongoose
Web applications / JS libraries

Vendor Valenok

Security Bulletin

This security bulletin contains information about 8 vulnerabilities.

1) Use-after-free error

EUVDB-ID: #VU9101

Risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-2891

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error in the HTTP server implementation. A remote attacker can send an ordinary HTTP POST request with a CGI target, cause a reuse of previously freed pointer, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update to version 6.10.

Vulnerable software versions

Mongoose: 6.8

External links

http://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0398


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper input validation

EUVDB-ID: #VU9102

Risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-2892

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists in the MQTT packet parsing functionality due to improper input validation. A remote attacker can send a specially crafted MQTT packet over network to cause an arbitrary out-of-bounds memory read and write potentially resulting in information disclosure, denial of service and remote code execution.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update to version 6.10.

Vulnerable software versions

Mongoose: 6.8

External links

http://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0399


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Null pointer dereference

EUVDB-ID: #VU9103

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-2893

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the MQTT packet parsing functionality due to improper input validation. A remote attacker can send a specially crafted MQTT SUBSCRIBE packet, trigger null pointer dereference and cause the server to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update to version 6.10.

Vulnerable software versions

Mongoose: 6.8

External links

http://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0400


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Stack-based buffer overflow

EUVDB-ID: #VU9104

Risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-2894

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to stack buffer overflow vulnerability exists in the MQTT packet parsing functionality. A remote attacker can send a specially crafted MQTT SUBSCRIBE packet, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update to version 6.10.

Vulnerable software versions

Mongoose: 6.8

External links

http://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0401


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Out-of-bounds read

EUVDB-ID: #VU9105

Risk: Low

CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-2895

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information or cause DoS condition on the target system.

The weakness exists in the MQTT packet parsing functionality due to out-of-bounds memory read. A remote attacker can send a specially crafted MQTT packet over network to cause an arbitrary out-of-bounds memory read and write potentially resulting in information disclosure and denial of service.

Mitigation

Update to version 6.10.

Vulnerable software versions

Mongoose: 6.8

External links

http://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0402


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Infinite loop

EUVDB-ID: #VU9106

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-2909

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the DNS server functionality due to improper input validation. A remote attacker can send a specially crafted DNS request, trigger an infinite loop programming error, cause an infinite loop resulting in high CPU usage and the server crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update to version 6.10.

Vulnerable software versions

Mongoose: 6.8

External links

http://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0416


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Memory corruption

EUVDB-ID: #VU9107

Risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-2921

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists in the Websocket protocol implementation due to boundary error. A remote attacker can send a specially crafted websocket packet over network to cause an an integer overflow leading to heap buffer overflow resulting in denial of service and potential remote code execution.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update to version 6.10.

Vulnerable software versions

Mongoose: 6.8

External links

http://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0428


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use-after-free error

EUVDB-ID: #VU9108

Risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-2922

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists in the Websocket protocol implementation due to use-after-free error. A remote attacker can send a specially crafted websocket packet, cause a buffer to be allocated while leaving stale pointers, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update to version 6.10.

Vulnerable software versions

Mongoose: 6.8

External links

http://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0429


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###