First published: Wed May 29 2019(Updated: )
When RPC is enabled in Wind River VxWorks 6.9 prior to 6.9.1, a specially crafted RPC request can trigger an integer overflow leading to an out-of-bounds memory copy. It may allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Windriver Vxworks | >=6.9<6.9.1 | |
Windriver Vxworks | =6.6 | |
Windriver Vxworks | =6.7 | |
Windriver Vxworks | =6.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9865 is a vulnerability in Wind River VxWorks 6.9 prior to 6.9.1 that allows a specially crafted RPC request to trigger an integer overflow leading to an out-of-bounds memory copy, potentially causing a denial of service or arbitrary code execution.
CVE-2019-9865 affects Wind River VxWorks versions 6.9 prior to 6.9.1, as well as versions 6.6, 6.7, and 6.8.
The severity of CVE-2019-9865 is rated as high with a CVSS score of 8.1.
CVE-2019-9865 can be exploited by sending a specially crafted RPC request.
Yes, the fix for CVE-2019-9865 is available in Wind River VxWorks version 6.9.1.