Executive Summary
Summary | |
---|---|
Title | NXP Semiconductors MQX RTOS contains multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | VU#590639 | First vendor Publication | 2017-10-12 |
Vendor | VU-CERT | Last vendor Modification | 2018-01-22 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#590639NXP Semiconductors MQX RTOS contains multiple vulnerabilitiesOverviewThe NXP Semiconductors MQX RTOS prior to version 5.1 contains a buffer overflow in the DHCP client, which may lead to memory corruption allowing an attacker to execute arbitrary code, as well as an out of bounds read in the DNS client which may lead to a denial of service. Description
Impact
Solution
Vendor Information (Learn More)
CVSS Metrics (Learn More)
References
CreditThanks to Scott Gayou for reporting this vulnerability. This document was written by Garret Wassermann. Other Information
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email. |
Original Source
Url : http://www.kb.cert.org/vuls/id/590639 |
Alert History
Date | Informations |
---|---|
2018-01-23 00:21:11 |
|
2017-10-13 17:22:49 |
|
2017-10-12 21:22:23 |
|