Описание
In the TCP implementation (gnrc_tcp) in RIOT through 2019.07, the parser for TCP options does not terminate on all inputs, allowing a denial-of-service, because sys/net/gnrc/transport_layer/tcp/gnrc_tcp_option.c has an infinite loop for an unknown zero-length option.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2019.07 (включая)
cpe:2.3:o:riot-os:riot:*:*:*:*:*:*:*:*
EPSS
Процентиль: 56%
0.00334
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-835
Связанные уязвимости
github
больше 3 лет назад
In the TCP implementation (gnrc_tcp) in RIOT through 2019.07, the parser for TCP options does not terminate on all inputs, allowing a denial-of-service, because sys/net/gnrc/transport_layer/tcp/gnrc_tcp_option.c has an infinite loop for an unknown zero-length option.
EPSS
Процентиль: 56%
0.00334
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-835