Vulnerability Name: | CVE-2016-20009 (CCN-198181) | ||||||||||||
Assigned: | 2016-08-09 | ||||||||||||
Published: | 2016-08-09 | ||||||||||||
Updated: | 2022-04-05 | ||||||||||||
Summary: | ** UNSUPPORTED WHEN ASSIGNED ** A DNS client stack-based buffer overflow in ipdnsc_decode_name() affects Wind River VxWorks 6.5 through 7. Note: This vulnerability only affects products that are no longer supported by the maintainer. | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.8 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
6.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-20009 Source: CCN Type: Exodus Blog, August 9, 2016 VxWorks: Execute My Packets Source: MISC Type: Exploit, Third Party Advisory https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/ Source: CONFIRM Type: Third Party Advisory https://cert-portal.siemens.com/productcert/pdf/ssa-553445.pdf Source: XF Type: UNKNOWN vxworks-cve201620009-bo(198181) Source: CCN Type: Wind River Web site VxWorks | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration 6: Configuration 7: Configuration 8: Configuration CCN 1: ![]() | ||||||||||||
BACK |