Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qj3c-vm3g-g389

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. The TCP input data processing function in pico_tcp.c does not validate the length of incoming TCP packets, which leads to an out-of-bounds read when assembling received packets into a data segment, eventually causing Denial-of-Service or an information leak.

An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. The TCP input data processing function in pico_tcp.c does not validate the length of incoming TCP packets, which leads to an out-of-bounds read when assembling received packets into a data segment, eventually causing Denial-of-Service or an information leak.

EPSS

Процентиль: 72%
0.00739
Низкий

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 9.1
nvd
около 5 лет назад

An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. The TCP input data processing function in pico_tcp.c does not validate the length of incoming TCP packets, which leads to an out-of-bounds read when assembling received packets into a data segment, eventually causing Denial-of-Service or an information leak.

EPSS

Процентиль: 72%
0.00739
Низкий

Дефекты

CWE-125