CVE-2020-27213
- EPSS 0.1%
- Veröffentlicht 10.10.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 05:20:52
An issue was discovered in Ethernut Nut/OS 5.1. The code that generates Initial Sequence Numbers (ISNs) for TCP connections derives the ISN from an insufficiently random source. As a result, an attacker may be able to determine the ISN of current and...
CVE-2020-25107
- EPSS 16.48%
- Veröffentlicht 11.12.2020 23:15:14
- Zuletzt bearbeitet 21.11.2024 05:17:21
An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. There is no check on whether a domain name has '\0' termination. This may lead to successful Denial-of-Service, and possibly Remote Code Execution.
CVE-2020-25108
- EPSS 11.57%
- Veröffentlicht 11.12.2020 23:15:14
- Zuletzt bearbeitet 21.11.2024 05:17:21
An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The DNS response data length is not checked (it can be set to an arbitrary value from a packet). This may lead to successful Denial-of-Service, and possibly Remote Code Exec...
CVE-2020-25109
- EPSS 16.48%
- Veröffentlicht 11.12.2020 23:15:14
- Zuletzt bearbeitet 21.11.2024 05:17:22
An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The number of DNS queries/responses (set in a DNS header) is not checked against the data present. This may lead to successful Denial-of-Service, and possibly Remote Code Ex...
CVE-2020-25110
- EPSS 16.48%
- Veröffentlicht 11.12.2020 23:15:14
- Zuletzt bearbeitet 21.11.2024 05:17:22
An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The length byte of a domain name in a DNS query/response is not checked, and is used for internal memory operations. This may lead to successful Denial-of-Service, and possi...