Описание
The code that processes DNS responses in uIP through 1.0, as used in Contiki and Contiki-NG, does not check whether the number of responses specified in the DNS packet header corresponds to the response data available in the DNS packet, leading to an out-of-bounds read and Denial-of-Service in resolv.c.
Ссылки
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до 1.0 (включая)
Одновременно
cpe:2.3:a:uip_project:uip:*:*:*:*:*:*:*:*
Одно из
cpe:2.3:o:contiki-ng:contiki-ng:-:*:*:*:*:*:*:*
cpe:2.3:o:contiki-os:contiki:-:*:*:*:*:*:*:*
EPSS
Процентиль: 70%
0.00639
Низкий
8.2 High
CVSS3
6.4 Medium
CVSS2
Дефекты
CWE-125
Связанные уязвимости
github
больше 3 лет назад
The code that processes DNS responses in uIP through 1.0, as used in Contiki and Contiki-NG, does not check whether the number of responses specified in the DNS packet header corresponds to the response data available in the DNS packet, leading to an out-of-bounds read and Denial-of-Service in resolv.c.
EPSS
Процентиль: 70%
0.00639
Низкий
8.2 High
CVSS3
6.4 Medium
CVSS2
Дефекты
CWE-125