Allele Security Alert
ASA-2019-00500, CVE-2019-12260, V7NET-2425
TCP Urgent Pointer state confusion caused by malformed TCP AO option
Wind River VxWorks
Wind River VxWorks 6 versions 6.9.x.x before 18.104.22.168
Wind River VxWorks 7 versions 2.x.x.x before 22.214.171.124
Wind River VxWorks 7 versions 1.x.x.x before 126.96.36.199
Wind River VxWorks 6 version 188.8.131.52
Wind River VxWorks 7 version 184.108.40.206
Wind River VxWorks 7 version 220.127.116.11
Proof of concept
A series of specially crafted TCP-segments where the last step is a TCP-segment with the URG-flag set may cause overflow of the buffer passed to recv(), recvfrom() or recvmsg() socket routines.
A prerequisite is that the system uses TCP sockets and listens to at least one TCP port. The impact of the vulnerability is a buffer overflow of up to a full TCP receive-windows (by default 10k-64k depending on version). The buffer overflow happens in the task calling recv()/recvfrom()/recvmsg(). Applications that pass a buffer equal to or larger than a full TCP window are not susceptible to this attack. Applications passing a stack-allocated variable as buffer are the easiest to exploit. The most likely outcome is a crash of the application reading from the affected socket. In the worst-case scenario, this vulnerability can potentially lead to RCE.
Ben Seri (Armis Labs)
SECURITY ADVISORY: WIND RIVER TCP/IP STACK (IPNET) VULNERABILITIES
SECURITY VULNERABILITY RESPONSE INFORMATION – TCP/IP Network Stack (IPnet, Urgent/11)
URGENT/11 Information from the Research Team – Armis Labs
Critical vulnerabilities to remotely compromise VxWorks, the most popular RTOS
Critical Zero Days Remotely Compromise the Most Popular Real-Time OS
If there is any error in this alert or you wish a comprehensive analysis, let us know.
Last modified: August 12, 2019