An exploitable heap overflow vulnerability exists in the WkbProgramLow function of WibuKey Network server management, version 6.40.2402.500. A specially crafted TCP packet can cause a heap overflow, potentially leading to remote code execution. An attacker can send a malformed TCP packet to trigger this vulnerability.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/107005 | third party advisory vdb entry |
https://cert-portal.siemens.com/productcert/pdf/ssa-844562.pdf | third party advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-760124.pdf | mitigation third party advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-902727.pdf | |
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0659 | third party advisory exploit |