CVE-2018-12680

The Serialize.deserialize() method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, CoAP reverse proxy, example collect CoAP server and client) when they receive crafted CoAP messages.
References
Link Resource
https://github.com/Tanganelli/CoAPthon/issues/135 Exploit Issue Tracking Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:coapthon_project:coapthon:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:coapthon_project:coapthon:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:coapthon_project:coapthon:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:coapthon_project:coapthon:3.1:*:*:*:*:*:*:*

Information

Published : 2019-04-02 13:29

Updated : 2019-10-02 17:03


NVD link : CVE-2018-12680

Mitre link : CVE-2018-12680


JSON object : View

CWE
CWE-502

Deserialization of Untrusted Data

Advertisement

dedicated server usa

Products Affected

coapthon_project

  • coapthon