Vulnerability CVE-2015-8299


Published: 2017-08-29

Description:
Buffer overflow in the Group messages monitor (Falcon) in KNX ETS 4.1.5 (Build 3246) allows remote attackers to execute arbitrary code via a crafted KNXnet/IP UDP packet.

See advisories in our WLB2 database:
Topic
Author
Date
High
KNX ETS 4.1.5 Build 3246 Buffer Overflow
Aljosha Judmayer
26.11.2015

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
KNX -> ETS 

 References:
http://packetstormsecurity.com/files/134524/KNX-ETS-4.1.5-Build-3246-Buffer-Overflow.html
https://github.com/sbaresearch/advisories/tree/public/2015/knAx_20150101

Copyright 2024, cxsecurity.com

 

Back to Top