Description
BACnet Protocol Stack through 0.8.6 has a segmentation fault leading to denial of service in BACnet APDU Layer because a malformed DCC in AtomicWriteFile, AtomicReadFile and DeviceCommunicationControl services. An unauthenticated remote attacker could cause a denial of service (bacserv daemon crash) because there is an invalid read in bacdcode.c during parsing of alarm tag numbers.
Published: 2019-05-30
Score: 7.5 High
EPSS: 15.0% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Bacnet Protocol Stack Project Bacnet Protocol Stack
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:24:38.525Z

Reserved: 2019-05-30T00:00:00.000Z

Link: CVE-2019-12480

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-05-30T22:29:00.183

Modified: 2024-11-21T04:22:56.717

Link: CVE-2019-12480

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses