[Suggested description] Buffer Overflow in coap_msg.c in FreeCoAP allows remote attackers to execute arbitrary code or cause a denial of service (stack buffer overflow) via a crafted packet. ------------------------------------------ [Vulnerability Type] Buffer Overflow ------------------------------------------ [Vendor of Product] https://github.com/keith-cullen/FreeCoAP ------------------------------------------ [Affected Product Code Base] An implementation of a CoAP client, a CoAP server and a HTTP/CoAP proxy with full DTLS support. https://github.com/keith-cullen/FreeCoAP - v0.7 ------------------------------------------ [Affected Component] coap_msg.c, coap_msg_parse_ops function, coap_msg_parse function, coap_server_trans_recv function, coap_server_exchange function, coap_server_run function (issue details: https://github.com/dqp10515/security/tree/main/FreeCoAP_bug) ------------------------------------------ [Attack Type] Remote ------------------------------------------ [Impact Code execution] true ------------------------------------------ [Attack Vectors] To exploit the vulnerability, an attacker must send a specially crafted packet to the CoAP server. Detailed steps to reproduce the issue can be found in the Reproduce Info section of the following link: https://github.com/dqp10515/security/tree/main/FreeCoAP_bug ------------------------------------------ [Reference] https://github.com/dqp10515/security/tree/main/FreeCoAP_bug ------------------------------------------ [Discoverer] wingtecher