A DNS client stack-based buffer overflow in ipdnsc_decode_name() affects Wind River VxWorks 6.5 through 7. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Link | Resource |
---|---|
https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/ | Exploit Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-553445.pdf | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-03-11T21:39:25
Updated: 2021-08-10T11:06:46
Reserved: 2021-03-11T00:00:00
Link: CVE-2016-20009
JSON object: View
NVD Information
Status : Modified
Published: 2021-03-11T22:15:12.120
Modified: 2024-05-17T01:08:37.820
Link: CVE-2016-20009
JSON object: View
Redhat Information
No data.
CWE