Описание
An issue was discovered in FNET through 4.6.4. The code for processing the hop-by-hop header (in the IPv6 extension headers) doesn't check for a valid length of an extension header, and therefore an out-of-bounds read can occur in _fnet_ip6_ext_header_handler_options in fnet_ip6.c, leading to Denial-of-Service.
Ссылки
- Release NotesThird Party Advisory
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
- Release NotesThird Party Advisory
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до 4.6.4 (включая)
cpe:2.3:a:butok:fnet:*:*:*:*:*:*:*:*
EPSS
Процентиль: 71%
0.00693
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-125
Связанные уязвимости
CVSS3: 7.5
github
больше 3 лет назад
An issue was discovered in FNET through 4.6.4. The code for processing the hop-by-hop header (in the IPv6 extension headers) doesn't check for a valid length of an extension header, and therefore an out-of-bounds read can occur in _fnet_ip6_ext_header_handler_options in fnet_ip6.c, leading to Denial-of-Service.
EPSS
Процентиль: 71%
0.00693
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-125