The Serialize.deserialize() method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, CoAP reverse proxy, example collect CoAP server and client) when they receive crafted CoAP messages.
References
Link | Resource |
---|---|
https://github.com/Tanganelli/CoAPthon/issues/135 | Exploit Issue Tracking Third Party Advisory |
https://github.com/Tanganelli/CoAPthon/issues/135 | Exploit Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Tanganelli/CoAPthon/issues/135 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2019-04-02 20:29
Updated : 2024-11-21 03:45
NVD link : CVE-2018-12680
Mitre link : CVE-2018-12680
CVE.ORG link : CVE-2018-12680
JSON object : View
Products Affected
coapthon_project
- coapthon
CWE
CWE-502
Deserialization of Untrusted Data