Vulnerability Description
Open On-Chip Debugger (OpenOCD) 0.10.0 does not block attempts to use HTTP POST for sending data to 127.0.0.1 port 4444, which allows remote attackers to conduct cross-protocol scripting attacks, and consequently execute arbitrary commands, via a crafted web site.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Debian Linux | 8.0 |
| Openocd | Open On-Chip Debugger | 0.10.0 |
Related Weaknesses (CWE)
References
- https://lists.debian.org/debian-lts-announce/2018/01/msg00027.htmlThird Party Advisory
- https://sourceforge.net/p/openocd/mailman/message/36188041/ExploitPatchThird Party Advisory
- https://www.debian.org/security/2018/dsa-4093Third Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/01/msg00027.htmlThird Party Advisory
- https://sourceforge.net/p/openocd/mailman/message/36188041/ExploitPatchThird Party Advisory
- https://www.debian.org/security/2018/dsa-4093Third Party Advisory
FAQ
What is CVE-2018-5704?
CVE-2018-5704 is a vulnerability with a CVSS score of 9.6 (CRITICAL). Open On-Chip Debugger (OpenOCD) 0.10.0 does not block attempts to use HTTP POST for sending data to 127.0.0.1 port 4444, which allows remote attackers to conduct cross-protocol scripting attacks, and ...
How severe is CVE-2018-5704?
CVE-2018-5704 has been rated CRITICAL with a CVSS base score of 9.6/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-5704?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Openocd Open On-Chip Debugger.