Synopsis
An application installed on the remote Windows host is affected by multiple vulnerabilities.
Description
The version of Real Time Innovations (RTI) Connext Data Distribution Service (DDS) installed on the remote Windows host is 5.1.1.x prior to 5.1.1.5 or 5.2.3.x prior to either 5.2.3.17 or 5.2.7. It is, therefore, affected by multiple vulnerabilities :
- A heap-based buffer overflow condition exists that allows an unauthenticated, remote attacker to execute arbitrary code with system privileges.
- An integer overflow condition exists that allows an unauthenticated, remote attacker to execute arbitrary code with system privileges.
- A deserialization issue exists due to improper validation of user-supplied data. An unauthenticated, remote attacker can exploit this to cause a denial of service condition and potentially the execution of arbitrary code.
- An out-of-bounds memory buffer issue exists that allows an unauthenticated, remote attacker to cause a denial of service condition and execute arbitrary code with system privileges.
Solution
Upgrade to RTI Connext DDS version 5.1.1.5 / 5.2.3.17 / 5.2.7 or later.
Note that customers with uncommon architectures may need to contact RTI for a custom patch. RTI is planning a major software release in June 2017 to address the vulnerabilities on all currently supported architectures.
Plugin Details
File Name: rti_connext_dds_2017-A-0097.nasl
Agent: windows
Configuration: Enable paranoid mode
Supported Sensors: Nessus Agent, Nessus
Vulnerability Information
CPE: x-cpe:/a:rti:connext_dds
Required KB Items: Settings/ParanoidReport, installed_sw/RTI Connext DDS
Vulnerability Publication Date: 4/13/2017