Lucene search

K
cvelistMitreCVELIST:CVE-2020-25928
HistoryAug 18, 2021 - 6:41 p.m.

CVE-2020-25928

2021-08-1818:41:00
mitre
www.cve.org
5
interniche nichestack
tcp/ip
buffer overflow
dns
execute arbitrary code
remote
response processing
attack vector
information leak
denial-of-service
remote code execution

AI Score

9.8

Confidence

High

EPSS

0.006

Percentile

78.5%

The DNS feature in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Buffer Overflow. The impact is: execute arbitrary code (remote). The component is: DNS response processing functions: dns_upcall(), getoffset(), dnc_set_answer(). The attack vector is: a specific DNS response packet. The code does not check the “response data length” field of individual DNS answers, which may cause out-of-bounds read/write operations, leading to Information leak, Denial-or-Service, or Remote Code Execution, depending on the context.

AI Score

9.8

Confidence

High

EPSS

0.006

Percentile

78.5%

Related for CVELIST:CVE-2020-25928