An out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no IP address argument is provided to the `PORT` command.
References
Link | Resource |
---|---|
https://github.com/weston-embedded/uC-FTPs/pull/2 | Patch |
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681 | Exploit Mitigation Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: talos
Published: 2023-05-10T15:23:52.324Z
Updated: 2023-05-10T17:00:06.089Z
Reserved: 2022-12-02T18:54:51.872Z
Link: CVE-2022-46377
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-05-10T16:15:10.153
Modified: 2023-05-18T21:23:25.000
Link: CVE-2022-46377
JSON object: View
Redhat Information
No data.