Логотип exploitDog
bind:CVE-2025-34468
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-34468

Количество 5

Количество 5

ubuntu логотип

CVE-2025-34468

около 1 месяца назад

libcoap versions up to and including 4.3.5, prior to commit 30db3ea, contain a stack-based buffer overflow in address resolution when attacker-controlled hostname data is copied into a fixed 256-byte stack buffer without proper bounds checking. A remote attacker can trigger a crash and potentially achieve remote code execution depending on compiler options and runtime memory protections. Exploitation requires the proxy logic to be enabled (i.e., the proxy request handling code path in an application using libcoap).

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2025-34468

около 1 месяца назад

libcoap versions up to and including 4.3.5, prior to commit 30db3ea, contain a stack-based buffer overflow in address resolution when attacker-controlled hostname data is copied into a fixed 256-byte stack buffer without proper bounds checking. A remote attacker can trigger a crash and potentially achieve remote code execution depending on compiler options and runtime memory protections. Exploitation requires the proxy logic to be enabled (i.e., the proxy request handling code path in an application using libcoap).

CVSS3: 9.8
EPSS: Низкий
msrc логотип

CVE-2025-34468

около 1 месяца назад

libcoap Stack-Based Buffer Overflow in Address Resolution DoS or Potential RCE

EPSS: Низкий
debian логотип

CVE-2025-34468

около 1 месяца назад

libcoap versions up to and including 4.3.5, prior to commit 30db3ea, c ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-rj9f-6c28-qf6x

около 1 месяца назад

libcoap versions up to and including 4.3.5, prior to commit 30db3ea, contain a stack-based buffer overflow in address resolution when attacker-controlled hostname data is copied into a fixed 256-byte stack buffer without proper bounds checking. A remote attacker can trigger a crash and potentially achieve remote code execution depending on compiler options and runtime memory protections. Exploitation requires the proxy logic to be enabled (i.e., the proxy request handling code path in an application using libcoap).

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-34468

libcoap versions up to and including 4.3.5, prior to commit 30db3ea, contain a stack-based buffer overflow in address resolution when attacker-controlled hostname data is copied into a fixed 256-byte stack buffer without proper bounds checking. A remote attacker can trigger a crash and potentially achieve remote code execution depending on compiler options and runtime memory protections. Exploitation requires the proxy logic to be enabled (i.e., the proxy request handling code path in an application using libcoap).

CVSS3: 9.8
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2025-34468

libcoap versions up to and including 4.3.5, prior to commit 30db3ea, contain a stack-based buffer overflow in address resolution when attacker-controlled hostname data is copied into a fixed 256-byte stack buffer without proper bounds checking. A remote attacker can trigger a crash and potentially achieve remote code execution depending on compiler options and runtime memory protections. Exploitation requires the proxy logic to be enabled (i.e., the proxy request handling code path in an application using libcoap).

CVSS3: 9.8
0%
Низкий
около 1 месяца назад
msrc логотип
CVE-2025-34468

libcoap Stack-Based Buffer Overflow in Address Resolution DoS or Potential RCE

0%
Низкий
около 1 месяца назад
debian логотип
CVE-2025-34468

libcoap versions up to and including 4.3.5, prior to commit 30db3ea, c ...

CVSS3: 9.8
0%
Низкий
около 1 месяца назад
github логотип
GHSA-rj9f-6c28-qf6x

libcoap versions up to and including 4.3.5, prior to commit 30db3ea, contain a stack-based buffer overflow in address resolution when attacker-controlled hostname data is copied into a fixed 256-byte stack buffer without proper bounds checking. A remote attacker can trigger a crash and potentially achieve remote code execution depending on compiler options and runtime memory protections. Exploitation requires the proxy logic to be enabled (i.e., the proxy request handling code path in an application using libcoap).

CVSS3: 9.8
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу