Lucene search

K
nvd[email protected]NVD:CVE-2023-38562
HistoryFeb 20, 2024 - 3:15 p.m.

CVE-2023-38562

2024-02-2015:15:08
CWE-415
web.nvd.nist.gov
2
cve-2023-38562
ip header loopback parsing
memory corruption
code execution
network packets
unauthenticated packets
vulnerability
weston embedded uc-tcp-ip

CVSS3

8.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0

Percentile

9.0%

A double-free vulnerability exists in the IP header loopback parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted set of network packets can lead to memory corruption, potentially resulting in code execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.

CVSS3

8.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0

Percentile

9.0%