Description
Integer overflow in the ndn_parse_sequence function in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact via vectors involving the typ and vallen variables.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-4042 | Integer overflow in the ndn_parse_sequence function in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact via vectors involving the typ and vallen variables. |
References
| Link | Providers |
|---|---|
| https://github.com/cn-uofbasel/ccn-lite/issues/136 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T18:36:56.463Z
Reserved: 2017-08-04T00:00:00.000Z
Link: CVE-2017-12470
No data.
Status : Modified
Published: 2018-02-07T17:29:00.920
Modified: 2024-11-21T03:09:35.037
Link: CVE-2017-12470
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD