Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-21970

Опубликовано: 04 фев. 2022
Источник: nvd
CVSS3: 3.7
CVSS3: 8.1
CVSS2: 6.8
EPSS Низкий

Описание

An out-of-bounds write vulnerability exists in the HandleSeaCloudMessage functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. The HandleIncomingSeaCloudMessage function uses at [3] the json_object_get_string to populate the p_name global variable. The p_name is only 0x80 bytes long, and the total MQTT message could be up to 0x201 bytes. Because the function json_object_get_string will fill str based on the length of the json’s value and not the actual str size, this would result in a possible out-of-bounds write.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:sealevel:seaconnect_370w_firmware:1.3.34:*:*:*:*:*:*:*
cpe:2.3:h:sealevel:seaconnect_370w:-:*:*:*:*:*:*:*

EPSS

Процентиль: 63%
0.00439
Низкий

3.7 Low

CVSS3

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-120
CWE-787

Связанные уязвимости

CVSS3: 8.1
github
почти 4 года назад

An out-of-bounds write vulnerability exists in the HandleSeaCloudMessage functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. The HandleIncomingSeaCloudMessage function uses at [3] the json_object_get_string to populate the p_name global variable. The p_name is only 0x80 bytes long, and the total MQTT message could be up to 0x201 bytes. Because the function json_object_get_string will fill str based on the length of the json’s value and not the actual str size, this would result in a possible out-of-bounds write.

EPSS

Процентиль: 63%
0.00439
Низкий

3.7 Low

CVSS3

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-120
CWE-787