Meinberg.NTP.Time.Server.Interface.Buffer.Overflow

description-logoDescription

This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Meinberg devices.
The vulnerability is due to an error when the vulnerable software handles a maliciously crafted HTTP POST request. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted HTTP POST request.

affected-products-logoAffected Products

Meinberg IMS-LANTIME M3000 Version 6.0 and prior
Meinberg IMS-LANTIME M1000 Version 6.0 and prior
Meinberg IMS-LANTIME M500 Version 6.0 and prior
Meinberg LANTIME M900 Version 6.0 and prior
Meinberg LANTIME M600 Version 6.0 and prior
Meinberg LANTIME M400 Version 6.0 and prior
Meinberg LANTIME M300 Version 6.0 and prior
Meinberg LANTIME M200 Version 6.0 and prior
Meinberg LANTIME M100 Version 6.0 and prior
Meinberg SyncFire 1100 Version 6.0 and prior
Meinberg LCES Version 6.0 and prior

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.meinberg.de/download/firmware/lantime/v6/firmware-6.20.004-x86.rel

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

References

40120