漏洞信息详情

Wind River Systems VxWorks 参数注入漏洞

漏洞简介

Wind River Systems VxWorks是美国风河系统(Wind River Systems)公司的一套嵌入式实时操作系统(RTOS)。

Wind River Systems VxWorks中存在参数注入漏洞。该漏洞源于外部输入数据构造命令参数的过程中,网络系统或产品未正确过滤参数中的特殊字符。攻击者可利用该漏洞执行非法命令。以下产品及版本受到影响:Wind River Systems VxWorks 7版本,6.9版本,6.8版本,6.7版本,6.6版本。

漏洞公告

目前厂商已发布升级补丁以修复漏洞,补丁获取链接:

https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/

参考网址

来源:www.windriver.com

链接:https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/security-advisory-ipnet/security-advisory-ipnet.pdf

来源:www.tenable.com

链接:https://www.tenable.com/blog/critical-vulnerabilities-dubbed-urgent11-place-devices-running-vxworks-at-risk-of-rce-attacks

来源:CONFIRM

链接:https://support.f5.com/csp/article/K41190253

来源:fortiguard.com

链接:https://fortiguard.com/psirt/FG-IR-19-222

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.2856/

来源:www.us-cert.gov

链接:https://www.us-cert.gov/ics/advisories/icsa-19-274-01

来源:support2.windriver.com

链接:https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12264

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/Wind-River-VxWorks-multiple-vulnerabilities-via-IPnet-29905

来源:www.us-cert.gov

链接:https://www.us-cert.gov/ics/advisories/icsa-19-211-01

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ASB-2019.0224/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2019.3245/

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2019-12264

受影响实体

    暂无


漏洞信息快速查询

相关漏洞

更多