ASA-2019-00497 – Wind River VxWorks: Heap overflow in DHCP Offer/ACK parsing in ipdhcpc


Allele Security Alert

ASA-2019-00497

Identifier(s)

ASA-2019-00497, CVE-2019-12257, VXW6-87101

Title

Heap overflow in DHCP Offer/ACK parsing in ipdhcpc

Vendor(s)

Wind River

Product(s)

Wind River VxWorks

Affected version(s)

Wind River VxWorks 6 versions 6.6, 6.7 and 6.8
Wind River VxWorks 6 versions 6.9.x before 6.9.4

Fixed version(s)

Wind River VxWorks 6 versions 6.9.4 and later

Proof of concept

Unknown

Description

A specially crafted DHCP packet may cause overflow of heap-allocated memory on VxWorks system using DHCP. The attacker must share LAN with the device as DHCP packets is not forwarded by IP-routers.

This vulnerability only affects systems that use the included DHCP client. DHCP packets may go past the local area network (LAN) via DHCP relays, but is otherwise confined to the LAN. The DHCP client may be used in VxWorks and in the bootrom. Bootrom using DHCP/BOOTP is only vulnerable during the boot process, not after the VxWorks image has booted. This defect may be used to overwrite the heap, which most likely results in a crash later on a task requesting memory from the heap. In the worst-case scenario, this vulnerability can potentially lead to RCE.

Technical details

Unknown

Credits

Ben Seri (Armis)

Reference(s)

SECURITY ADVISORY: WIND RIVER TCP/IP STACK (IPNET) VULNERABILITIES
https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/security-advisory-ipnet.pdf

SECURITY VULNERABILITY RESPONSE INFORMATION – TCP/IP Network Stack (IPnet, Urgent/11)
https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/

CVE: CVE-2019-12257 - Wind River Support Network
https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12257

URGENT/11 Information from the Research Team – Armis Labs
https://armis.com/urgent11/

Critical vulnerabilities to remotely compromise VxWorks, the most popular RTOS
https://go.armis.com/hubfs/White-papers/Urgent11%20Technical%20White%20Paper.pdf

Critical Zero Days Remotely Compromise the Most Popular Real-Time OS
https://i.blackhat.com/USA-19/Thursday/us-19-Seri-Critical-Zero-Days-Remotely-Compromise-The-Most-Popular-Real-Time-OS.pdf

CVE-2019-12257
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12257

CVE-2019-12257
https://nvd.nist.gov/vuln/detail/CVE-2019-12257

If there is any error in this alert or you wish a comprehensive analysis, let us know.

Last modified: August 12, 2019

We are not responsible for any data loss, device corruption or any other type of issue due to the use of any information mentioned in our security alerts.