First published: Thu Dec 06 2018(Updated: )
An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. A crafted IP header triggers a full memory space copy in prvProcessIPPacket, leading to denial of service and possibly remote code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Amazon Amazon Web Services Freertos | <=1.3.1 | |
Amazon Freertos | <=10.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-16601 is high, with a CVSS score of 8.1.
CVE-2018-16601 can lead to denial of service and potentially remote code execution in AWS FreeRTOS.
Amazon Web Services (AWS) FreeRTOS versions up to 1.3.1 are affected by CVE-2018-16601.
To fix CVE-2018-16601, it is recommended to update to a patched version of AWS FreeRTOS.
More information about CVE-2018-16601 can be found in the provided references.