Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3qrq-p37g-j4wm

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

An issue was discovered in HCC embedded InterNiche 4.0.1. A potential heap buffer overflow exists in the code that parses the HTTP POST request, due to lack of size validation. This vulnerability requires the attacker to send a crafted HTTP POST request with a URI longer than 50 bytes. This leads to a heap overflow in wbs_post() via an strcpy() call.

An issue was discovered in HCC embedded InterNiche 4.0.1. A potential heap buffer overflow exists in the code that parses the HTTP POST request, due to lack of size validation. This vulnerability requires the attacker to send a crafted HTTP POST request with a URI longer than 50 bytes. This leads to a heap overflow in wbs_post() via an strcpy() call.

EPSS

Процентиль: 82%
0.01697
Низкий

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 9.8
nvd
больше 4 лет назад

An issue was discovered in HCC embedded InterNiche 4.0.1. A potential heap buffer overflow exists in the code that parses the HTTP POST request, due to lack of size validation. This vulnerability requires the attacker to send a crafted HTTP POST request with a URI longer than 50 bytes. This leads to a heap overflow in wbs_post() via an strcpy() call.

CVSS3: 9.1
fstec
больше 4 лет назад

Уязвимость стеков TCP/IP NicheLite и InterNiche, связанная с ошибками обработки HTTP-запросов, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 82%
0.01697
Низкий

Дефекты

CWE-787