The Sub-IoT implementation of the DASH 7 Alliance protocol has a vulnerability that can lead to an out-of-bounds write prior to implementation version 0.5.0. If the protocol has been compiled using default settings, this will only grant the attacker access to allocated but unused memory. However, if it was configured using non-default settings, there is the possibility that exploiting this vulnerability could lead to system crashes and remote code execution.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2023-02-28T23:16:22.740Z
Updated: 2024-08-02T05:24:34.501Z
Reserved: 2023-02-15T19:37:55.663Z
Link: CVE-2023-0847
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-03-01T00:15:10.897
Modified: 2024-11-21T07:37:56.923
Link: CVE-2023-0847
Redhat
No data.