Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-22284

Опубликовано: 22 июл. 2021
Источник: debian

Описание

A buffer overflow vulnerability in the zepif_linkoutput() function of Free Software Foundation lwIP git head version and version 2.1.2 allows attackers to access sensitive information via a crafted 6LoWPAN packet.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
lwipfixed2.1.3+dfsg1-1package
lwipfixed2.1.2+dfsg1-8+deb11u1bullseyepackage
lwipnot-affectedbusterpackage

Примечания

  • https://savannah.nongnu.org/bugs/index.php?58554

  • https://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=8363c24e45a32728e385cfc2c3c36d88a8a9e70b (master)

  • https://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=379d55044e9181533f1fd4d0e0cf89bc01cb9b8b (STABLE-2_1_3_RC1)

  • Vulnerable feature introduced with https://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=43a55003da622851b1c1677c8e7cb75e9430300f (first contained in STABLE-2_1_0_RC1)

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

A buffer overflow vulnerability in the zepif_linkoutput() function of Free Software Foundation lwIP git head version and version 2.1.2 allows attackers to access sensitive information via a crafted 6LoWPAN packet.

CVSS3: 7.5
nvd
больше 4 лет назад

A buffer overflow vulnerability in the zepif_linkoutput() function of Free Software Foundation lwIP git head version and version 2.1.2 allows attackers to access sensitive information via a crafted 6LoWPAN packet.

github
больше 3 лет назад

A buffer overflow vulnerability in the zepif_linkoutput() function of Free Software Foundation lwIP git head version and version 2.1.2 allows attackers to access sensitive information via a crafted 6LoWPAN packet.

CVSS3: 7.5
fstec
больше 4 лет назад

Уязвимость функции zepif_linkoutput() реализации набора протоколов TCP/IP lwIP, позволяющая нарушителю получить доступ к конфиденциальным данным