Описание
An issue was discovered in Treck IPv6 before 6.0.1.68. Improper input validation in the IPv6 component when handling a packet sent by an unauthenticated remote attacker could result in an out-of-bounds read of up to three bytes via network access.
Ссылки
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 6.0.1.68 (исключая)
cpe:2.3:a:treck:ipv6:*:*:*:*:*:*:*:*
EPSS
Процентиль: 50%
0.00271
Низкий
3.7 Low
CVSS3
5.3 Medium
CVSS3
5 Medium
CVSS2
Дефекты
CWE-20
CWE-125
Связанные уязвимости
CVSS3: 5.3
github
больше 3 лет назад
An issue was discovered in Treck IPv6 before 6.0.1.68. Improper input validation in the IPv6 component when handling a packet sent by an unauthenticated remote attacker could result in an out-of-bounds read of up to three bytes via network access.
CVSS3: 5.3
fstec
около 5 лет назад
Уязвимость реализации протокола IPv6 стека Treck TCP/IP , позволяющая нарушителю читать произвольные файлы
EPSS
Процентиль: 50%
0.00271
Низкий
3.7 Low
CVSS3
5.3 Medium
CVSS3
5 Medium
CVSS2
Дефекты
CWE-20
CWE-125