-
-
Save dqp10515/e9d7d663cb89187bfe7b39bb3aeb0113 to your computer and use it in GitHub Desktop.
CVE-2024-40494
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[Suggested description] | |
Buffer Overflow in coap_msg.c in FreeCoAP allows remote attackers to | |
execute arbitrary code or cause a denial of service (stack buffer | |
overflow) via a crafted packet. | |
------------------------------------------ | |
[Vulnerability Type] | |
Buffer Overflow | |
------------------------------------------ | |
[Vendor of Product] | |
https://github.com/keith-cullen/FreeCoAP | |
------------------------------------------ | |
[Affected Product Code Base] | |
An implementation of a CoAP client, a CoAP server and a HTTP/CoAP proxy with full DTLS support. https://github.com/keith-cullen/FreeCoAP - v0.7 | |
------------------------------------------ | |
[Affected Component] | |
coap_msg.c, coap_msg_parse_ops function, coap_msg_parse function, coap_server_trans_recv function, coap_server_exchange function, coap_server_run function (issue details: https://github.com/dqp10515/security/tree/main/FreeCoAP_bug) | |
------------------------------------------ | |
[Attack Type] | |
Remote | |
------------------------------------------ | |
[Impact Code execution] | |
true | |
------------------------------------------ | |
[Attack Vectors] | |
To exploit the vulnerability, an attacker must send a specially crafted packet to the CoAP server. Detailed steps to reproduce the issue can be found in the Reproduce Info section of the following link: https://github.com/dqp10515/security/tree/main/FreeCoAP_bug | |
------------------------------------------ | |
[Reference] | |
https://github.com/dqp10515/security/tree/main/FreeCoAP_bug | |
------------------------------------------ | |
[Discoverer] | |
wingtecher |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment