First published: Mon Feb 04 2019(Updated: )
RIOT RIOT-OS version after commit 7af03ab624db0412c727eed9ab7630a5282e2fd3 contains a Buffer Overflow vulnerability in sock_dns, an implementation of the DNS protocol utilizing the RIOT sock API that can result in Remote code executing. This attack appears to be exploitable via network connectivity.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Riot-os Riot | >=2017.04<2018.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1000006 is classified as a critical vulnerability due to the potential for remote code execution.
To mitigate CVE-2019-1000006, users should update to a version of RIOT OS that includes the fix for this vulnerability.
CVE-2019-1000006 affects RIOT-OS versions after commit 7af03ab624db0412c727eed9ab7630a5282e2fd3 and before version 2018.10.1.
Yes, CVE-2019-1000006 can be exploited remotely via network connectivity, allowing potential attackers to execute arbitrary code.
The sock_dns component, part of the DNS implementation in RIOT OS, is primarily involved in CVE-2019-1000006.