Описание
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE.
Specially crafted MESH message could result in memory corruption when non-default build configuration is used. This issue affects Apache NimBLE: through 1.7.0.
Users are recommended to upgrade to version 1.8.0, which fixes the issue.
Ссылки
- Patch
- Mailing ListVendor Advisory
- Mailing ListVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.8.0 (исключая)
cpe:2.3:a:apache:nimble:*:*:*:*:*:*:*:*
EPSS
Процентиль: 11%
0.00037
Низкий
6.3 Medium
CVSS3
Дефекты
CWE-120
Связанные уязвимости
CVSS3: 6.3
github
около 1 года назад
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE. Specially crafted MESH message could result in memory corruption when non-default build configuration is used. This issue affects Apache NimBLE: through 1.7.0. Users are recommended to upgrade to version 1.8.0, which fixes the issue.
EPSS
Процентиль: 11%
0.00037
Низкий
6.3 Medium
CVSS3
Дефекты
CWE-120