Описание
An issue was discovered in uIP through 1.0, as used in Contiki and Contiki-NG. Domain name parsing lacks bounds checks, allowing an attacker to corrupt memory with crafted DNS packets.
Ссылки
- ProductThird Party Advisory
- ProductThird Party Advisory
- ProductThird Party Advisory
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
- ProductThird Party Advisory
- ProductThird Party Advisory
- ProductThird Party Advisory
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до 1.0 (включая)
Одновременно
cpe:2.3:a:uip_project:uip:*:*:*:*:*:*:*:*
Одно из
cpe:2.3:o:contiki-ng:contiki-ng:-:*:*:*:*:*:*:*
cpe:2.3:o:contiki-os:contiki:-:*:*:*:*:*:*:*
EPSS
Процентиль: 84%
0.02087
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-125
Связанные уязвимости
CVSS3: 7.5
ubuntu
около 5 лет назад
An issue was discovered in uIP through 1.0, as used in Contiki and Contiki-NG. Domain name parsing lacks bounds checks, allowing an attacker to corrupt memory with crafted DNS packets.
github
больше 3 лет назад
An issue was discovered in uIP through 1.0, as used in Contiki and Contiki-NG. Domain name parsing lacks bounds checks, allowing an attacker to corrupt memory with crafted DNS packets.
EPSS
Процентиль: 84%
0.02087
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-125