Логотип exploitDog
bind:CVE-2020-25927
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-25927

Количество 3

Количество 3

nvd логотип

CVE-2020-25927

больше 4 лет назад

The DNS feature in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Out-of-bounds Read. The impact is: a denial of service (remote). The component is: DNS response processing in function: dns_upcall(). The attack vector is: a specific DNS response packet. The code does not check whether the number of queries/responses specified in the DNS packet header corresponds to the query/response data available in the DNS packet.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-pfcm-j5pc-4mx7

больше 3 лет назад

The DNS feature in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Out-of-bounds Read. The impact is: a denial of service (remote). The component is: DNS response processing in function: dns_upcall(). The attack vector is: a specific DNS response packet. The code does not check whether the number of queries/responses specified in the DNS packet header corresponds to the query/response data available in the DNS packet.

EPSS: Низкий
fstec логотип

BDU:2021-04490

больше 4 лет назад

Уязвимость DNS-клиента стеков TCP/IP NicheLite и InterNiche, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-25927

The DNS feature in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Out-of-bounds Read. The impact is: a denial of service (remote). The component is: DNS response processing in function: dns_upcall(). The attack vector is: a specific DNS response packet. The code does not check whether the number of queries/responses specified in the DNS packet header corresponds to the query/response data available in the DNS packet.

CVSS3: 7.5
0%
Низкий
больше 4 лет назад
github логотип
GHSA-pfcm-j5pc-4mx7

The DNS feature in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Out-of-bounds Read. The impact is: a denial of service (remote). The component is: DNS response processing in function: dns_upcall(). The attack vector is: a specific DNS response packet. The code does not check whether the number of queries/responses specified in the DNS packet header corresponds to the query/response data available in the DNS packet.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-04490

Уязвимость DNS-клиента стеков TCP/IP NicheLite и InterNiche, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.2
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу