CVE-2018-16598
5.9MEDIUMAn issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. In xProcessReceivedUD
Publicado: 12/6/2018Actualizado: 11/21/2024
Descripción
An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. In xProcessReceivedUDPPacket and prvParseDNSReply, any received DNS response is accepted, without confirming it matches a sent DNS request.
Análisis IAImpulsado por IA
Productos Afectados
amazonamazon_web_services_freertos
amazonfreertos
Referencias
- https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-details/PatchThird Party Advisory
- https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/Third Party Advisory
- https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.mdRelease NotesThird Party Advisory
- https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-details/PatchThird Party Advisory
- https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/Third Party Advisory
- https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.mdRelease NotesThird Party Advisory