Summary
The jq JSON processor, which is used to migrate firmware configurations in the product, contains 2 vulnerabilities that can be exploited by an authenticated attacker.
Impact
An authenticated attacker can cause a denial of service.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
1153079 | FL MGUARD 1102 | Firmware <1.8.1 |
1153078 | FL MGUARD 1105 | Firmware <1.8.1 |
Vulnerabilities
Expand / Collapse alljq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function jv_string_vfmt
in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 void* p = malloc(sz);
. As of time of publication, no patched versions are available.
jq is a command-line JSON processor. In versions up to and including 1.7.1, an integer overflow arises when assigning value using an index of 2147483647, the signed integer limit. This causes a denial of service. Commit de21386681c0df0104a99d9d09db23a9b2a78b1e contains a patch for the issue.
Remediation
Phoenix Contact strongly recommends upgrading affected mGuard devices to firmware version 1.8.1 or higher which fixes this vulnerability.
Revision History
Version | Date | Summary |
---|---|---|
1 | 04.08.2025 12:00 | Initial revision. |