Ccn-lite

Ccn-lite

17 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.44%
  • Veröffentlicht 26.06.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:46:02

An issue was discovered in CCN-lite 2.0.1. There is a heap-based buffer overflow in mkAddToRelayCacheRequest and in ccnl_populate_cache for an array lacking '\0' termination when reading a binary CCNx or NDN file. This can result in Heap Corruption. ...

  • EPSS 0.63%
  • Veröffentlicht 14.02.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:33

CCN-lite 2.0.0 Beta allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact because the ccnl_ndntlv_prependBlob function in ccnl-pkt-ndntlv.c can be called with wrong arguments. Specifically, t...

  • EPSS 0.44%
  • Veröffentlicht 13.02.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:28

In CCN-lite 2, the Parser of NDNTLV does not verify whether a certain component's length field matches the actual component length, which has a resultant buffer overflow and out-of-bounds memory accesses.

  • EPSS 0.44%
  • Veröffentlicht 13.02.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:28

In CCN-lite 2, the function ccnl_prefix_to_str_detailed can cause a buffer overflow, when writing a prefix to the buffer buf. The maximal size of the prefix is CCNL_MAX_PREFIX_SIZE; the buffer has the size CCNL_MAX_PREFIX_SIZE. However, when NFN is e...

  • EPSS 0.43%
  • Veröffentlicht 07.02.2018 17:29:01
  • Zuletzt bearbeitet 21.11.2024 03:09:35

ccnl_ccntlv_bytes2pkt in CCN-lite allows context-dependent attackers to cause a denial of service (application crash) via vectors involving packets with "wrong L values."

  • EPSS 0.34%
  • Veröffentlicht 07.02.2018 17:29:01
  • Zuletzt bearbeitet 21.11.2024 03:09:35

ccnl-ext-mgmt.c in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact by leveraging missing NULL pointer checks after ccnl_malloc.

  • EPSS 0.44%
  • Veröffentlicht 07.02.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:09:34

Buffer overflow in util/ccnl-common.c in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact by leveraging incorrect memory allocation.

  • EPSS 0.41%
  • Veröffentlicht 07.02.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:09:35

The cnb_parse_lev function in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact by leveraging failure to check for out-of-bounds conditions, which triggers an invalid read in the hexdump function.

  • EPSS 0.41%
  • Veröffentlicht 07.02.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:09:35

Integer overflow in the ndn_parse_sequence function in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact via vectors involving the typ and vallen variables.

  • EPSS 0.44%
  • Veröffentlicht 07.02.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:09:34

Buffer overflow in ccn-lite-ccnb2xml.c in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact via vectors involving the vallen and len variables.