漏洞标题
N/A
漏洞描述信息
在梅赛德斯-奔驰NTG(新远程信息技术世代)6至2021版本中发现了一个问题。服务代理服务中可能存在堆栈缓冲区溢出,影响NTG 6主机单元。为了执行此类攻击,需要访问主机单元底板的以太网针脚。通过使用静态IP地址,攻击者可以通过内部网络连接到服务代理服务。通过准备好的HTTP请求,攻击者可以导致服务代理服务失效。
CVSS信息
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
漏洞类别
跨界内存写
漏洞标题
N/A
漏洞描述信息
An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6 through 2021. A possible stack buffer overflow in the Service Broker service affects NTG 6 head units. To perform this attack, physical access to Ethernet pins of the head unit base board is needed. With a static IP address, an attacker can connect via the internal network to the Service Broker service. With prepared HTTP requests, an attacker can cause the Service-Broker service to fail.
CVSS信息
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
N/A