Vulnerability Description
Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component allow remote attackers to execute arbitrary code or leak information because of a Buffer Overflow during parsing of DNS\LLMNR packets in prvParseDNSReply.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Amazon | Amazon Web Services Freertos | <= 1.3.1 |
| Amazon | Freertos | <= 10.0.1 |
References
- https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-details/ExploitThird Party Advisory
- https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-dThird Party Advisory
- https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.mdRelease NotesThird Party Advisory
- https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-details/ExploitThird Party Advisory
- https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-dThird Party Advisory
- https://github.com/aws/amazon-freertos/blob/v1.3.2/CHANGELOG.mdRelease NotesThird Party Advisory
FAQ
What is CVE-2018-16525?
CVE-2018-16525 is a vulnerability with a CVSS score of 8.1 (HIGH). Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component allow remote attackers to execute arbitrary code ...
How severe is CVE-2018-16525?
CVE-2018-16525 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-16525?
Check the references section above for vendor advisories and patch information. Affected products include: Amazon Amazon Web Services Freertos, Amazon Freertos.