CVE-2018-12679

The Serialize.deserialize() method in CoAPthon3 1.0 and 1.0.1 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, example collect CoAP server and client) when they receive crafted CoAP messages.
References
Link Resource
https://github.com/Tanganelli/CoAPthon3/issues/16 Exploit Issue Tracking Third Party Advisory
https://github.com/Tanganelli/CoAPthon3/issues/16 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:coapthon3_project:coapthon3:1.0:*:*:*:*:*:*:*
cpe:2.3:a:coapthon3_project:coapthon3:1.0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 03:45

Type Values Removed Values Added
References () https://github.com/Tanganelli/CoAPthon3/issues/16 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/Tanganelli/CoAPthon3/issues/16 - Exploit, Issue Tracking, Third Party Advisory

Information

Published : 2019-04-02 19:29

Updated : 2024-11-21 03:45


NVD link : CVE-2018-12679

Mitre link : CVE-2018-12679

CVE.ORG link : CVE-2018-12679


JSON object : View

Products Affected

coapthon3_project

  • coapthon3
CWE
CWE-502

Deserialization of Untrusted Data