The Serialize.deserialize() method in CoAPthon3 1.0 and 1.0.1 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, example collect CoAP server and client) when they receive crafted CoAP messages.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0029 | The Serialize.deserialize() method in CoAPthon3 1.0 and 1.0.1 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, example collect CoAP server and client) when they receive crafted CoAP messages. |
Github GHSA |
GHSA-c6fm-rgw4-8q73 | CoAPthon3 vulnerable to Deserialization of Untrusted Data |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/Tanganelli/CoAPthon3/issues/16 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T08:45:00.668Z
Reserved: 2018-06-22T00:00:00
Link: CVE-2018-12679
No data.
Status : Modified
Published: 2019-04-02T19:29:00.260
Modified: 2024-11-21T03:45:39.877
Link: CVE-2018-12679
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA