A DNS client stack-based buffer overflow in ipdnsc_decode_name() affects Wind River VxWorks 6.5 through 7. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/ | third party advisory exploit |
https://cert-portal.siemens.com/productcert/pdf/ssa-553445.pdf | third party advisory |