Page 5 of 39 results (0.015 seconds)

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 headers does not validate whether the IPv6 payload length field is equal to the actual size of the payload, which leads to an Out-of-Bounds read during the ICMPv6 checksum calculation, resulting in either Denial-of-Service or Information Disclosure. This affects pico_ipv6_extension_headers and pico_checksum_adder (in pico_ipv6.c and pico_frame.c). Se detectó un problema en picoTCP versión 1.7.0. El código para procesar los encabezados de IPv6 no comprueba si el campo de longitud de la carga útil de IPv6 es igual al tamaño real de la carga útil, lo que conlleva a una Lectura Fuera de Límites durante el cálculo de la suma de comprobación ICMPv6, resultando en una Denegación de Servicio o Divulgación de información. • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 https://www.kb.cert.org/vuls/id/815128 • CWE-125: Out-of-bounds Read •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 1

Microchip CryptoAuthentication Library CryptoAuthLib prior to 20191122 has a Buffer Overflow (issue 1 of 2). Microchip CryptoAuthentication Library CryptoAuthLib versiones anteriores a 20191122, presenta un desbordamiento del búfer (problema 1 de 2) • http://www.openwall.com/lists/oss-security/2020/10/22/1 https://census-labs.com/news/2020/10/21/microchip-cryptoauthlib-atcab_sign_base-buffer-overflow https://www.microchip.com/design-centers/security-ics/cryptoauthentication • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 1

Microchip CryptoAuthentication Library CryptoAuthLib prior to 20191122 has a Buffer Overflow (issue 2 of 2). La biblioteca CryptoAuthentication de Microchip CryptoAuthLib versiones anteriores a 20191122, presenta un desbordamiento del búfer (problema 2 de 2) • http://www.openwall.com/lists/oss-security/2020/10/22/1 https://census-labs.com/news/2020/10/21/microchip-cryptoauthlib-atcab_genkey_base-buffer-overflow https://www.microchip.com/design-centers/security-ics/cryptoauthentication • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 1

Atmel Advanced Software Framework (ASF) 4 has an Integer Overflow. Atmel Advanced Software Framework (ASF) versión 4, presenta un desbordamiento de enteros • https://census-labs.com/news/2020/10/21/microchip-asf4-integer-overflows-in-flash_read-flash_write-and-flash_append https://www.microchip.com/mplab/avr-support/advanced-software-framework https://www.openwall.com/lists/oss-security/2020/10/22/1 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.5EPSS: 0%CPEs: 152EXPL: 0

The Secure Monitor in Microchip Atmel ATSAMA5 products use a hardcoded key to encrypt and authenticate secure applets. Los productos Secure Monitor en Microchip Atmel ATSAMA5 utilizan una clave embebida para cifrar y autenticar subprogramas seguros • https://labs.f-secure.com/advisories/microchip-atsama5-soc-multiple-vulnerabilities • CWE-798: Use of Hard-coded Credentials •