#VU15436 Memory corruption in WITTENSTEIN high integrity systems products - CVE-2018-16526

 

#VU15436 Memory corruption in WITTENSTEIN high integrity systems products - CVE-2018-16526

Published: October 19, 2018 / Updated: December 11, 2018


Vulnerability identifier: #VU15436
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: CVE-2018-16526
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
FreeRTOS
OpenRTOS
SafeRTOS
Software vendor:
Amazon Web Services
WITTENSTEIN high integrity systems

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to the code doesn’t handle IP Options at all and simply removes them from the packet by using memmove and truncating the xDataLength field of the network buffer. A remote attacker can trigger memory corruption in usGenerateProtocolChecksum and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update the affected software to version 1.3.2.

External links