Description
RIOT RIOT-OS version after commit 7af03ab624db0412c727eed9ab7630a5282e2fd3 contains a Buffer Overflow vulnerability in sock_dns, an implementation of the DNS protocol utilizing the RIOT sock API that can result in Remote code executing. This attack appears to be exploitable via network connectivity.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-1729 | RIOT RIOT-OS version after commit 7af03ab624db0412c727eed9ab7630a5282e2fd3 contains a Buffer Overflow vulnerability in sock_dns, an implementation of the DNS protocol utilizing the RIOT sock API that can result in Remote code executing. This attack appears to be exploitable via network connectivity. |
References
| Link | Providers |
|---|---|
| https://github.com/RIOT-OS/RIOT/issues/10739 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T03:00:19.313Z
Reserved: 2019-01-09T00:00:00.000Z
Link: CVE-2019-1000006
No data.
Status : Modified
Published: 2019-02-04T21:29:00.830
Modified: 2024-11-21T04:17:39.580
Link: CVE-2019-1000006
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD