Логотип exploitDog
bind:CVE-2019-14323
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-14323

Количество 2

Количество 2

nvd логотип

CVE-2019-14323

больше 6 лет назад

SSDP Responder 1.x through 1.5 mishandles incoming network messages, leading to a stack-based buffer overflow by 1 byte. This results in a crash of the server, but only when strict stack checking is enabled. This is caused by an off-by-one error in ssdp_recv in ssdpd.c.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-v6w6-5g29-2cp9

больше 3 лет назад

SSDP Responder 1.x through 1.5 mishandles incoming network messages, leading to a stack-based buffer overflow by 1 byte. This results in a crash of the server, but only when strict stack checking is enabled. This is caused by an off-by-one error in ssdp_recv in ssdpd.c.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-14323

SSDP Responder 1.x through 1.5 mishandles incoming network messages, leading to a stack-based buffer overflow by 1 byte. This results in a crash of the server, but only when strict stack checking is enabled. This is caused by an off-by-one error in ssdp_recv in ssdpd.c.

CVSS3: 7.5
0%
Низкий
больше 6 лет назад
github логотип
GHSA-v6w6-5g29-2cp9

SSDP Responder 1.x through 1.5 mishandles incoming network messages, leading to a stack-based buffer overflow by 1 byte. This results in a crash of the server, but only when strict stack checking is enabled. This is caused by an off-by-one error in ssdp_recv in ssdpd.c.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу