Filtered by vendor Ethernut
Subscribe
Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-25109 | 1 Ethernut | 1 Nut\/os | 2020-12-14 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The number of DNS queries/responses (set in a DNS header) is not checked against the data present. This may lead to successful Denial-of-Service, and possibly Remote Code Execution. | |||||
CVE-2020-25108 | 1 Ethernut | 1 Nut\/os | 2020-12-14 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The DNS response data length is not checked (it can be set to an arbitrary value from a packet). This may lead to successful Denial-of-Service, and possibly Remote Code Execution. | |||||
CVE-2020-25107 | 1 Ethernut | 1 Nut\/os | 2020-12-14 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. There is no check on whether a domain name has '\0' termination. This may lead to successful Denial-of-Service, and possibly Remote Code Execution. | |||||
CVE-2020-25110 | 1 Ethernut | 1 Nut\/os | 2020-12-14 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The length byte of a domain name in a DNS query/response is not checked, and is used for internal memory operations. This may lead to successful Denial-of-Service, and possibly Remote Code Execution. |