First published: Thu Mar 11 2021(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** A DNS client stack-based buffer overflow in ipdnsc_decode_name() affects Wind River VxWorks 6.5 through 7. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Windriver Vxworks | >=6.5<=7.0 | |
Siemens Sgt-100 Firmware | ||
Siemens Sgt-100 | ||
Siemens Sgt-200 Firmware | ||
Siemens Sgt-200 | ||
Siemens Sgt-300 Firmware | ||
Siemens Sgt-300 | ||
Siemens Sgt-400 Firmware | ||
Siemens Sgt-400 | ||
Siemens Sgt-a20 Firmware | ||
Siemens Sgt-a20 | ||
Siemens Sgt-a35 Firmware | ||
Siemens Sgt-a35 | ||
Siemens Sgt-a65 Firmware | ||
Siemens Sgt-a65 | ||
All of | ||
Siemens Sgt-100 Firmware | ||
Siemens Sgt-100 | ||
All of | ||
Siemens Sgt-200 Firmware | ||
Siemens Sgt-200 | ||
All of | ||
Siemens Sgt-300 Firmware | ||
Siemens Sgt-300 | ||
All of | ||
Siemens Sgt-400 Firmware | ||
Siemens Sgt-400 | ||
All of | ||
Siemens Sgt-a20 Firmware | ||
Siemens Sgt-a20 | ||
All of | ||
Siemens Sgt-a35 Firmware | ||
Siemens Sgt-a35 | ||
All of | ||
Siemens Sgt-a65 Firmware | ||
Siemens Sgt-a65 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-20009 is a DNS client stack-based buffer overflow vulnerability affecting Wind River VxWorks 6.5 through 7 and some Siemens products.
CVE-2016-20009 is considered a critical vulnerability with a severity score of 9.8 out of 10.
CVE-2016-20009 affects Wind River VxWorks 6.5 through 7 and some Siemens products including Sgt-100 Firmware, Sgt-200 Firmware, Sgt-300 Firmware, Sgt-400 Firmware, Sgt-a20 Firmware, Sgt-a35 Firmware, and Sgt-a65 Firmware.
To fix CVE-2016-20009, it is recommended to apply the necessary patches or updates provided by Wind River or Siemens.
You can find more information about CVE-2016-20009 at the following references: [Reference 1](https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/) and [Reference 2](https://cert-portal.siemens.com/productcert/pdf/ssa-553445.pdf).