First published: Thu Dec 06 2018(Updated: )
An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. Out of bounds memory access during parsing of NBNS packets in prvTreatNBNS can be used for information disclosure.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Amazon Amazon Web Services Freertos | <=1.3.1 | |
Amazon Freertos | <=10.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-16599 is medium with a severity value of 5.9.
The affected software includes Amazon Web Services (AWS) FreeRTOS through 1.3.1 and FreeRTOS up to V10.0.1 (with FreeRTOS+TCP).
CVE-2018-16599 can be exploited through out of bounds memory access during parsing of NBNS packets in prvTreatNBNS, which can be used for information disclosure.
Yes, you can find references for CVE-2018-16599 at the following links: [Link 1](https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-details/), [Link 2](https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/), [Link 3](https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.md)
CVE-2018-16599 is associated with CWE-200.