100M+ Devices affected by NAME:WRECK vulnerability

Threat Advisories

100M+ Devices affected by NAME:WRECK vulnerability

THREAT LEVEL: Amber.

For a detailed advisory, download the pdf file here.

Nine Vulnerabilities affecting common TCP/IP stacks which includes FreeBSD, Nucleus NET, Ipnet & NetX can cause Denial of Service (DOS) or Remote Code Execution (RCE). These vulnerabilities are related to Domain Name System clients of affected products. Manipulation of DNS requests and responses allows attacker to control the target devices or take the devices offline. Multiple verticals including healthcare, manufacturing, retail, government are impacted.

Vulnerability Details

CVE IDVulnerability DetailsPotential ImpactCWE ID
CVE-2021-25677The DNS client does not properly randomize DNS transaction IDs. That could allow an attacker to poison the DNS cache or spoof DNS resolvingDNS
cache
poisoning
CWE-330
CVE-2020-27009The DNS domain name record decompression functionality does not properly validate the pointer offset values. The parsing of malformed responses could result in a write past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to execute code in the context of the current process or cause a denial-of-service condition.RCE
CVE-2020-15795The DNS domain name label parsing functionality does not properly validate the names in DNS responses. The parsing of malformed responses could result in a write past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to execute code in the context of the current process or cause a denial-of-service condition.RCE
CVE-2020-27736The DNS domain name label parsing functionality does not properly validate the null-terminated name in DNS-responses. The parsing of malformed responses could result in a read past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition or leak the read memory.DOSCWE-170
CVE-2020-27737The DNS response parsing functionality does not properly validate various length and counts of the records. The parsing of malformed responses could result in a read past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition or leak the memory past the allocated structure.DOSCWE-125
CVE-2020-27738The DNS domain name record decompression functionality does not properly validate the pointer offset values. The parsing of malformed responses could result in a read access past the end of an allocated structure. An attacker with a privileged position in the network could leverage this vulnerability to cause a denial-of-service condition.DOCCWE-788
CVE-2016-20009The DNS client has a stack-based overflow on the message decompression function leading to a potential RCE.RCECWE-787
CVE-2020-7461In FreeBSD 12.1-STABLE before r365010, 11.4-STABLE before r365011, 12.1-RELEASE before p9, 11.4-RELEASE before p3, and 11.3-RELEASE before p13, dhclient(8) fails to handle certain malformed input related to handling of DHCP option 119 resulting a heap overflow. The heap overflow could in principle be exploited to achieve remote code execution. The affected process runs with reduced privileges in a Capsicum sandbox, limiting the immediate impact of an exploit.RCECWE-787
UNASSIGNEDA message-compression bug impacting devices running NetX and can lead to DNS cache- poisoning attacksDOS
References