Allele Security Alert
ASA-2019-00496, CVE-2019-12256, V7NET-2423
Stack overflow in the parsing of IPv4 packets’ IP options
Wind River VxWorks
Wind River VxWorks 6 version 6.9.3
Wind River VxWorks 6 version 6.9.4 before 22.214.171.124
Wind River VxWorks 7 versions 2.x.x.x before 126.96.36.199
Wind River VxWorks 7 versions 1.x.x.x before 188.8.131.52
Wind River VxWorks 6 version 184.108.40.206
Wind River VxWorks 7 version 220.127.116.11
Wind River VxWorks 7 version 18.104.22.168
Proof of concept
A specially crafted IPv4 packet, containing invalid encoded SSRR/LSRR options, may cause call-stack overflow. No specific services beyond IPv4 protocol support is required.
Not affected by user-application code, this vulnerability resides in the IPv4 option parsing and may be triggered by IPv4 packets containing invalid options. The most likely outcome of triggering this defect is that the tNet0 task crashes. In the worst-case scenario, this vulnerability can potentially lead to RCE.
Ben Seri (Armis)
SECURITY ADVISORY: WIND RIVER TCP/IP STACK (IPNET) VULNERABILITIES
SECURITY VULNERABILITY RESPONSE INFORMATION – TCP/IP Network Stack (IPnet, Urgent/11)
URGENT/11 Information from the Research Team – Armis Labs
Critical vulnerabilities to remotely compromise VxWorks, the most popular RTOS
Critical Zero Days Remotely Compromise the Most Popular Real-Time OS
If there is any error in this alert or you wish a comprehensive analysis, let us know.
Last modified: August 14, 2019