An out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no port argument is provided to the `PORT` command.
References
Link | Resource |
---|---|
https://github.com/weston-embedded/uC-FTPs/pull/2 | Patch |
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681 | Exploit Mitigation Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: talos
Published: 2023-05-10T15:23:52.423Z
Updated: 2023-05-10T17:00:06.217Z
Reserved: 2022-12-02T18:54:51.872Z
Link: CVE-2022-46378
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-05-10T16:15:10.413
Modified: 2023-05-18T21:23:16.240
Link: CVE-2022-46378
JSON object: View
Redhat Information
No data.