Executive Summary

Informations
NameCVE-2018-16598First vendor Publication2018-12-06
VendorCveLast vendor Modification2019-01-03

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score4.3Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. In xProcessReceivedUDPPacket and prvParseDNSReply, any received DNS response is accepted, without confirming it matches a sent DNS request.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16598

CWE : Common Weakness Enumeration

%idName
100 %CWE-441Unintended Proxy/Intermediary

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1
Application1

Sources (Detail)

SourceUrl
CONFIRM https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md
MISC https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-details/
https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-rang...

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2019-01-04 05:17:57
  • Multiple Updates
2018-12-07 05:19:15
  • First insertion