Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-65497

Опубликовано: 24 нояб. 2025
Источник: debian
EPSS Низкий

Описание

NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libcoap3fixed4.3.5-2package
libcoap3fixed4.3.4-1.1+deb13u2trixiepackage
libcoap3no-dsabookwormpackage
libcoap2removedpackage
libcoap2postponedbullseyepackage

Примечания

  • https://github.com/obgm/libcoap/issues/1745

  • https://github.com/obgm/libcoap/pull/1750

EPSS

Процентиль: 34%
0.00139
Низкий

Связанные уязвимости

CVSS3: 4.3
ubuntu
3 месяца назад

NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.

CVSS3: 4.3
nvd
3 месяца назад

NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.

CVSS3: 4.3
github
3 месяца назад

NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.

EPSS

Процентиль: 34%
0.00139
Низкий