An issue was discovered in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a long message in a TCP request that leads to std::length_error.
References
Link | Resource |
---|---|
https://github.com/drachtio/drachtio-server/commit/4cf9fe2c420b86c16442215d449d40be777c1911 | Patch Third Party Advisory |
https://github.com/drachtio/drachtio-server/issues/245 | Exploit Third Party Advisory |
Configurations
History
22 Dec 2022, 18:16
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:drachtio:drachtio-server:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-noinfo | |
References | (MISC) https://github.com/drachtio/drachtio-server/issues/245 - Exploit, Third Party Advisory | |
References | (MISC) https://github.com/drachtio/drachtio-server/commit/4cf9fe2c420b86c16442215d449d40be777c1911 - Patch, Third Party Advisory | |
First Time |
Drachtio
Drachtio drachtio-server |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
18 Dec 2022, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-18 05:15
Updated : 2023-12-10 14:48
NVD link : CVE-2022-47515
Mitre link : CVE-2022-47515
CVE.ORG link : CVE-2022-47515
JSON object : View
Products Affected
drachtio
- drachtio-server
CWE