Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-38jp-4v3p-cc3q

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The code that processes DNS responses in uIP through 1.0, as used in Contiki and Contiki-NG, does not check whether the number of responses specified in the DNS packet header corresponds to the response data available in the DNS packet, leading to an out-of-bounds read and Denial-of-Service in resolv.c.

The code that processes DNS responses in uIP through 1.0, as used in Contiki and Contiki-NG, does not check whether the number of responses specified in the DNS packet header corresponds to the response data available in the DNS packet, leading to an out-of-bounds read and Denial-of-Service in resolv.c.

EPSS

Процентиль: 70%
0.00639
Низкий

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 8.2
nvd
около 5 лет назад

The code that processes DNS responses in uIP through 1.0, as used in Contiki and Contiki-NG, does not check whether the number of responses specified in the DNS packet header corresponds to the response data available in the DNS packet, leading to an out-of-bounds read and Denial-of-Service in resolv.c.

EPSS

Процентиль: 70%
0.00639
Низкий

Дефекты

CWE-125