ASN.1 is a standard representation of data for networking and telecommunications applications. Objective System's ASN1C compiler generates C and C++ code that may be vulnerable to heap overflow.
CWE-122: Heap-based Buffer Overflow - CVE-2016-5080
ASN1C is used to generate high-level-language code from ASN.1 syntax. According to the reporter, the generated C and C++ code from ASN1C may be vulnerable to heap overflow in the generated heap manager's rtxMemHeapAlloc function. It is currently unclear if a similar vulnerability exists in other output languages such as Java. and C#.
The impact may vary depending on how the vulnerable code is used in an application. In worst case, an application that utilizes ASN.1 data from untrusted sources may be exploited by a remote unauthenticated attacker to execute arbitrary code with permissions of the application (typically root/SYSTEM).
Apply an update
The vendors listed below were primarily sourced from Objective Systems' customer list. The CERT/CC has no further evidence that any particular vendor is impacted unless marked Affected; vendors are encouraged to reach out to us to clarify their status.
Objective Systems Affected
Check Point Software Technologies Not Affected
Hewlett Packard Enterprise Not Affected
Honeywell Not Affected
Huawei Technologies Not Affected
Juniper Networks Not Affected
QUALCOMM Incorporated Not Affected
Siemens Not Affected
BAE Systems Unknown
Booz Allen Hamilton Unknown
Deutsche Telekom Unknown
General Dynamics Unknown
Harris Corporation Unknown
IBM Corporation Unknown
Intel Corporation Unknown
Microsoft Corporation Unknown
Motorola, Inc. Unknown
NEC Corporation Unknown
Samsung Mobile Unknown
Sony Corporation Unknown
Vodafone Group, Inc. Unknown
Thanks to Lucas Molas and Ivan Arce of Programa STIC at the Fundación Sadosky for researching and coordinating this vulnerability.
This document was written by Garret Wassermann.
|Date First Published:||2016-07-19|
|Date Last Updated:||2016-08-26 18:07 UTC|