fkie_cve-2019-12257
Vulnerability from fkie_nvd
Published
2019-08-09 18:15
Modified
2024-11-21 04:22
Summary
Wind River VxWorks 6.6 through 6.9 has a Buffer Overflow in the DHCP client component. There is an IPNET security vulnerability: Heap overflow in DHCP Offer/ACK parsing inside ipdhcpc.
References
cve@mitre.orghttps://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdfThird Party Advisory
cve@mitre.orghttps://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdfThird Party Advisory
cve@mitre.orghttps://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20190802-0001/Third Party Advisory
cve@mitre.orghttps://support.f5.com/csp/article/K41190253Third Party Advisory
cve@mitre.orghttps://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12257Vendor Advisory
cve@mitre.orghttps://support2.windriver.com/index.php?page=security-noticesIssue Tracking, Vendor Advisory
cve@mitre.orghttps://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdfThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdfThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20190802-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.f5.com/csp/article/K41190253Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12257Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://support2.windriver.com/index.php?page=security-noticesIssue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/Vendor Advisory
Impacted products
Vendor Product Version
windriver vxworks *
sonicwall sonicos *
sonicwall sonicos *
sonicwall sonicos *
sonicwall sonicos *
sonicwall sonicos *
sonicwall sonicos *
sonicwall sonicos *
sonicwall sonicos *
sonicwall sonicos *
sonicwall sonicos *
sonicwall sonicos *
sonicwall sonicos *
sonicwall sonicos *
sonicwall sonicos 6.2.7.0
sonicwall sonicos 6.2.7.1
sonicwall sonicos 6.2.7.7
siemens siprotec_5_firmware *
siemens siprotec_5 -
netapp e-series_santricity_os_controller *
siemens siprotec_5_firmware *
siemens siprotec_5 -
siemens ruggedcom_win7000_firmware *
siemens ruggedcom_win7000 -
siemens ruggedcom_win7018_firmware *
siemens ruggedcom_win7018 -
siemens ruggedcom_win7025_firmware *
siemens ruggedcom_win7025 -
siemens ruggedcom_win7200_firmware *
siemens ruggedcom_win7200 -
belden hirschmann_hios *
belden hirschmann_ees20 -
belden hirschmann_ees25 -
belden hirschmann_eesx20 -
belden hirschmann_eesx30 -
belden hirschmann_grs1020 -
belden hirschmann_grs1030 -
belden hirschmann_grs1042 -
belden hirschmann_grs1120 -
belden hirschmann_grs1130 -
belden hirschmann_grs1142 -
belden hirschmann_msp30 -
belden hirschmann_msp32 -
belden hirschmann_rail_switch_power_lite -
belden hirschmann_rail_switch_power_smart -
belden hirschmann_red25 -
belden hirschmann_rsp20 -
belden hirschmann_rsp25 -
belden hirschmann_rsp30 -
belden hirschmann_rsp35 -
belden hirschmann_rspe30 -
belden hirschmann_rspe32 -
belden hirschmann_rspe35 -
belden hirschmann_rspe37 -
belden hirschmann_hios *
belden hirschmann_msp40 -
belden hirschmann_octopus_os3 -
belden hirschmann_hios *
belden hirschmann_dragon_mach4000 -
belden hirschmann_dragon_mach4500 -
belden hirschmann_hios *
belden hirschmann_eagle_one -
belden hirschmann_eagle20 -
belden hirschmann_eagle30 -
belden garrettcom_magnum_dx940e_firmware *
belden garrettcom_magnum_dx940e -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "326AA5C8-31F6-4107-93AF-1F64C1D9129E",
              "versionEndExcluding": "6.9.4",
              "versionStartIncluding": "6.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C417C4-DC9B-48A8-AEAE-755BCC2DA389",
              "versionEndIncluding": "5.9.0.7",
              "versionStartIncluding": "5.9.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F047B55-4AAB-438D-BBF2-A0BAD4A5AFB2",
              "versionEndIncluding": "5.9.1.12",
              "versionStartIncluding": "5.9.1.0.",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "90EA3BDF-084B-4D67-B0EF-4D27CA0EF283",
              "versionEndIncluding": "6.2.3.1",
              "versionStartIncluding": "6.2.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59A1A87-D7B3-4F38-A83E-8CBF0A55A476",
              "versionEndIncluding": "6.2.4.3",
              "versionStartIncluding": "6.2.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C306A1CA-3A13-4085-A481-25A6B2D2412A",
              "versionEndIncluding": "6.2.5.3",
              "versionStartIncluding": "6.2.5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "819517C6-9288-45B1-96B0-90B05AA5F3C4",
              "versionEndIncluding": "6.2.6.1",
              "versionStartIncluding": "6.2.6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31148F5D-C86F-463D-9A5B-9D82515EF901",
              "versionEndIncluding": "6.2.7.4",
              "versionStartIncluding": "6.2.7.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24520D09-E8D2-43BE-A4D3-19FE828A4309",
              "versionEndIncluding": "6.2.9.2",
              "versionStartIncluding": "6.2.9.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF416ABF-027E-4571-A81C-36280BFAA1F1",
              "versionEndIncluding": "6.5.0.3",
              "versionStartIncluding": "6.5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C253EDA-69CE-4C3A-9ABF-A7C55CEFA29C",
              "versionEndIncluding": "6.5.1.4",
              "versionStartIncluding": "6.5.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "70C43F8A-0B85-4042-B691-8FDC841A3C2B",
              "versionEndIncluding": "6.5.2.3",
              "versionStartIncluding": "6.5.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F26B212-EE89-485A-A414-553C0F39DCA3",
              "versionEndIncluding": "6.5.3.3",
              "versionStartIncluding": "6.5.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6BA5213-EA5E-423B-9207-E06AED2917B3",
              "versionEndIncluding": "6.5.4.3",
              "versionStartIncluding": "6.5.4.0.",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicos:6.2.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC6DEEC-5FB4-4017-B8F0-99A17AD93A52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicos:6.2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6DA86B-D7E7-48E6-B841-206B9501DA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sonicwall:sonicos:6.2.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0A2A903-3092-40FB-99FE-B864C52D343E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp200",
              "matchCriteriaId": "E7F2B915-D41F-4D3C-A52D-A63AB729716F",
              "versionEndExcluding": "7.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:siprotec_5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E0F0E17-7BE6-40B8-985B-DF2F5F9D2CA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E243199-8506-4F65-9C22-2CBD50208F0D",
              "versionEndIncluding": "8.40.50.00",
              "versionStartIncluding": "8.00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:siprotec_5_firmware:*:*:*:*:*:*:*:cp300",
              "matchCriteriaId": "00314478-416E-488B-ADBF-DDED873ABE41",
              "versionEndExcluding": "7.91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:siprotec_5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E0F0E17-7BE6-40B8-985B-DF2F5F9D2CA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:ruggedcom_win7000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "47C998D1-9DD5-4470-9241-174170541408",
              "versionEndExcluding": "bs5.2.461.17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:ruggedcom_win7000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD6F6C12-9373-48F2-B576-C9AC7A287B53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:ruggedcom_win7018_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8216AFC1-213B-4E31-8660-5161E08A7C4E",
              "versionEndExcluding": "bs5.2.461.17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:ruggedcom_win7018:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0F5DBF-4730-40CE-B9CE-DD4DA31D3ED6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:ruggedcom_win7025_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE5D7B8D-E74F-4839-8839-23894307992D",
              "versionEndExcluding": "bs5.2.461.17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:ruggedcom_win7025:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63967CFD-D35C-4793-858A-032C44E282F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:ruggedcom_win7200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD25C864-C272-45B7-8EC5-9120DF6A2072",
              "versionEndExcluding": "bs5.2.461.17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:ruggedcom_win7200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7146409-09B7-499C-9544-361B234E952D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3950CA89-B400-427C-B6F2-54337AB694E0",
              "versionEndIncluding": "07.0.07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_ees20:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D35A90AD-034E-434A-B989-4F871E0AD9A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_ees25:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EF7BBA-2BCC-4A16-BBEE-E67CE8F95BE4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_eesx20:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F453AF-21B0-4611-95D7-88AD821632E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_eesx30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE6A655D-ED55-4344-9F75-5995371C87C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_grs1020:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29576107-85D0-4877-875F-7F60EFDB803D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_grs1030:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF6200A3-7B4F-4A8E-B9DC-EE6A82093C20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_grs1042:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBA19D8-8B2D-4AD0-AA77-A3139C33F44D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_grs1120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4F7FEA-BB1F-405E-A047-87D0BF0DF054",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_grs1130:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "641912E2-C368-4438-8D5C-F6615B9FDABC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_grs1142:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F86BB5E8-4499-4E4F-AE5E-1471B297C16F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_msp30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E89FAE18-5B44-4203-ABFD-BC40AF7E51BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_msp32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D0DFE2E-2356-46D6-B2D9-89FD907CA168",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rail_switch_power_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDE06D94-B686-4468-86CF-AA68BB5CFEF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rail_switch_power_smart:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC6487F7-284A-40C2-B70D-9380AD2A47C1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_red25:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79354FA2-4C48-4506-94BE-7B9ECB18015D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rsp20:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED918F8-041E-4FFC-AFE8-484828696EDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rsp25:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ED7974C-BBE6-4BAE-8962-7B5638C7AE20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rsp30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE16D46-7BA9-43D4-BB4E-1B638CE6C41B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rsp35:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "165B837A-EF09-489F-BD7C-54107F491BC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rspe30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C06BF302-8E62-41DB-AA67-6369527B598F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rspe32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56D29DAB-C5D6-4539-86E4-43624FB957A9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rspe35:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "305A9B3E-786C-4F8E-BE36-B4ED84650288",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_rspe37:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CBC8B88-4EC3-4827-B100-3A5A91B29CC2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2681FAC3-1E59-497A-9931-F4059F84EF86",
              "versionEndIncluding": "07.5.01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_msp40:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E92390DF-BFCC-4F30-88A0-33F63CA9B1B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_octopus_os3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A18D078E-1F1A-4DE5-AE43-840D96BE1C6C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98C84F5B-72F6-4059-B634-80EE072D0DF9",
              "versionEndIncluding": "07.2.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_dragon_mach4000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E0562EC-4942-4D14-A634-8A6A5FDB9561",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_dragon_mach4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79E8B334-8109-4664-8DCC-10876BD702DC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:belden:hirschmann_hios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB09BFE-D6C9-4433-A53A-F79608BFACA9",
              "versionEndIncluding": "05.3.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_eagle_one:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D6D7B3E-90AD-43D9-9192-453A37921E8F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_eagle20:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "771189D9-34F0-400D-938B-2AA218C28C43",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:belden:hirschmann_eagle30:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DCF228A-F3A8-4B36-A105-04E88980BA76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:belden:garrettcom_magnum_dx940e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE3BDD99-1DFA-4037-8E77-902F39842153",
              "versionEndIncluding": "1.0.1_y7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:belden:garrettcom_magnum_dx940e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B635F0-96C1-49DA-957C-2ECD55A316C0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Wind River VxWorks 6.6 through 6.9 has a Buffer Overflow in the DHCP client component. There is an IPNET security vulnerability: Heap overflow in DHCP Offer/ACK parsing inside ipdhcpc."
    },
    {
      "lang": "es",
      "value": "Wind River VxWorks versiones 6.6 y 6.9, presenta un Desbordamiento de B\u00fafer en el componente cliente DHCP. Se presenta una vulnerabilidad de seguridad de IPNET: Desbordamiento de la pila en an\u00e1lisis Offer/ACK de DHCP dentro de ipdhcpc."
    }
  ],
  "id": "CVE-2019-12257",
  "lastModified": "2024-11-21T04:22:30.007",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-08-09T18:15:11.320",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.f5.com/csp/article/K41190253"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12257"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://support2.windriver.com/index.php?page=security-notices"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20190802-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.f5.com/csp/article/K41190253"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support2.windriver.com/index.php?page=cve\u0026on=view\u0026id=CVE-2019-12257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://support2.windriver.com/index.php?page=security-notices"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.