First published: Tue Feb 07 2017(Updated: )
Integer overflow in the _authenticate function in svc_auth.c in Wind River VxWorks 5.5 through 6.9.4.1, when the Remote Procedure Call (RPC) protocol is enabled, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a username and password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wind River VxWorks | <=6.9.4.1 | |
Wind River VxWorks | =5.5 | |
Wind River VxWorks | =6.4 | |
Wind River VxWorks | =6.7 | |
Wind River VxWorks | =6.8 | |
Wind River VxWorks | =6.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7599 has a high severity rating due to the potential for remote code execution or denial of service.
To fix CVE-2015-7599, you should update to a patched version of Wind River VxWorks that addresses this integer overflow vulnerability.
The affected versions of Wind River VxWorks for CVE-2015-7599 include 5.5, and versions 6.4 through 6.9.4.1.
CVE-2015-7599 can facilitate denial of service attacks or potentially allow remote attackers to execute arbitrary code.
There are no specific workarounds for CVE-2015-7599 other than upgrading to a secure version.