First published: Thu Dec 06 2018(Updated: )
An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. Out of bounds memory access during parsing of ARP packets in eARPProcessPacket can be used for information disclosure.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Amazon Amazon Web Services Freertos | <=1.3.1 | |
Amazon Freertos | <=10.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16600 is a vulnerability in Amazon Web Services (AWS) FreeRTOS and WITTENSTEIN WHIS Connect middleware TCP/IP component that allows out of bounds memory access during parsing of ARP packets, leading to information disclosure.
CVE-2018-16600 affects Amazon Web Services (AWS) FreeRTOS versions up to 1.3.1 and FreeRTOS versions up to V10.0.1 (with FreeRTOS+TCP).
CVE-2018-16600 has a severity level of medium, with a CVSSv3 score of 5.9.
CVE-2018-16600 can be exploited by sending specially crafted ARP packets to the vulnerable system, allowing an attacker to access out of bounds memory and potentially disclose sensitive information.
To fix CVE-2018-16600, users should update to the latest version of Amazon Web Services (AWS) FreeRTOS and FreeRTOS, which have patched the vulnerability.