First published: Thu Jun 20 2019(Updated: )
A heap-based buffer over-read in Service_SetParamStringValue in cosa_x_cisco_com_ddns_dml.c of the RDK RDKB-20181217-1 CcspPandM module may allow attackers with login credentials to achieve information disclosure and code execution by crafting an AJAX call responsible for DDNS configuration with an exactly 64-byte username, password, or domain, for which the buffer size is insufficient for the final '\0' character. This is related to the CcspCommonLibrary and WebUI modules.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rdkcentral Rdkb Ccsppandm | =rdkb-20181217-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2019-6964.
The severity of CVE-2019-6964 is high with a severity value of 8.8.
Attackers with login credentials can exploit CVE-2019-6964 by crafting an AJAX call responsible for DDNS configuration.
Attackers can achieve information disclosure and code execution by exploiting CVE-2019-6964.
Please refer to the provided reference link for information on how to mitigate CVE-2019-6964.