Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-24336

Опубликовано: 11 дек. 2020
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Низкий

Описание

An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*
Версия до 4.5 (включая)
cpe:2.3:o:contiki-os:contiki:*:*:*:*:*:*:*:*
Версия до 3.0 (включая)

EPSS

Процентиль: 83%
0.0183
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-120

Связанные уязвимости

github
больше 3 лет назад

An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled.

EPSS

Процентиль: 83%
0.0183
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-120