<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>Wind River VxWorks IPnet TCP/IP Stack Vulnerabilities (aka. URGENT/11)</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-19-222</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2019-08-26T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2019-08-26T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2019-08-26T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            11 zero day vulnerabilities (aka. URGENT/11) were disclosed in VxWorks® TCP/IP stack (IPnet):CVE-2019-12255 - TCP Urgent Pointer = 0 leads to integer underflow.CVE-2019-12256 - Stack overflow in the parsing of IPv4 packets’ IP options.CVE-2019-12257 - Heap overflow in DHCP Offer/Ack parsing inside ipdhcpc.CVE-2019-12258 - DoS of TCP connection via malformed TCP options.CVE-2019-12259 - DoS via NULL dereference in IGMP parsing.CVE-2019-12260 - TCP Urgent Pointer state confusion caused by malformed TCP AO option.CVE-2019-12261 - TCP Urgent Pointer state confusion during connect() to a remote host.CVE-2019-12262 - Handling of unsolicited Reverse ARP replies (logic flaw).CVE-2019-12263 - TCP Urgent Pointer state confusion due to a race condition.CVE-2019-12264 - Logic flaw in IPv4 assignment by ipdhcpc DHCP client.CVE-2019-12265 - IGMP information leak via IGMPv3 specific membership report.
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Denial of service
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            The following Fortinet products are NOT affected:FortiOS FortiAPFortiSwitchFortiAnalyzerFortiMailFortiManagerFortiWebNone of the products above are using or based on VxWorks operating system.
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:DocumentReferences>
        <cvrf:Reference>
            <cvrf:URL>https://fortiguard.fortinet.com/psirt/FG-IR-19-222</cvrf:URL>
            <cvrf:Description>Wind River VxWorks IPnet TCP/IP Stack Vulnerabilities (aka. URGENT/11)</cvrf:Description>
        </cvrf:Reference>
        <cvrf:Reference>
            <cvrf:URL>https://armis.com/urgent11/</cvrf:URL>
            <cvrf:Description>https://armis.com/urgent11/</cvrf:Description>
        </cvrf:Reference>
    </cvrf:DocumentReferences>
    <Vulnerability Ordinal="1">
        <Title>Wind River VxWorks IPnet TCP/IP Stack Vulnerabilities (aka. URGENT/11)</Title>
        <cvrf:CVE>CVE-2019-12255</cvrf:CVE>
        <cvrf:CVE>CVE-2019-12256</cvrf:CVE>
        <cvrf:CVE>CVE-2019-12257</cvrf:CVE>
        <cvrf:CVE>CVE-2019-12258</cvrf:CVE>
        <cvrf:CVE>CVE-2019-12259</cvrf:CVE>
        <cvrf:CVE>CVE-2019-12260</cvrf:CVE>
        <cvrf:CVE>CVE-2019-12261</cvrf:CVE>
        <cvrf:CVE>CVE-2019-12262</cvrf:CVE>
        <cvrf:CVE>CVE-2019-12263</cvrf:CVE>
        <cvrf:CVE>CVE-2019-12264</cvrf:CVE>
        <cvrf:CVE>CVE-2019-12265</cvrf:CVE>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>0</BaseScoreV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-19-222</URL>
                <Description>Wind River VxWorks IPnet TCP/IP Stack Vulnerabilities (aka. URGENT/11)</Description>
            </Reference>Reference>
            <Reference>
                <URL>https://armis.com/urgent11/</URL>
                <Description>https://armis.com/urgent11/</Description>
            </Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>