A DNS client stack-based buffer overflow in ipdnsc_decode_name() affects Wind River VxWorks 6.5 through 7. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
                
            References
                    | Link | Resource | 
|---|---|
| https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/ | Exploit Third Party Advisory | 
| https://cert-portal.siemens.com/productcert/pdf/ssa-553445.pdf | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
Configuration 2 (hide)
| AND | 
            
            
 
  | 
    
Configuration 3 (hide)
| AND | 
            
            
 
  | 
    
Configuration 4 (hide)
| AND | 
            
            
 
  | 
    
Configuration 5 (hide)
| AND | 
            
            
 
  | 
    
Configuration 6 (hide)
| AND | 
            
            
 
  | 
    
Configuration 7 (hide)
| AND | 
            
            
 
  | 
    
Configuration 8 (hide)
| AND | 
            
            
 
  | 
    
History
                    No history.
Information
                Published : 2021-03-11 22:15
Updated : 2024-05-17 01:08
NVD link : CVE-2016-20009
Mitre link : CVE-2016-20009
CVE.ORG link : CVE-2016-20009
JSON object : View
Products Affected
                siemens
- sgt-300
 - sgt-a65_firmware
 - sgt-a65
 - sgt-100
 - sgt-a20_firmware
 - sgt-200_firmware
 - sgt-a35
 - sgt-100_firmware
 - sgt-a20
 - sgt-200
 - sgt-400_firmware
 - sgt-a35_firmware
 - sgt-400
 - sgt-300_firmware
 
windriver
- vxworks
 
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
