The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 04:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt - Third Party Advisory | |
References | () https://cwe.mitre.org/data/definitions/125.html - Technical Description | |
References | () https://jsof-tech.com/vulnerability-disclosure-policy/ - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20200625-0006/ - Third Party Advisory | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC - Third Party Advisory | |
References | () https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities - Third Party Advisory | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html - Third Party Advisory | |
References | () https://www.jsof-tech.com/ripple20/ - Exploit, Third Party Advisory | |
References | () https://www.kb.cert.org/vuls/id/257161 - Third Party Advisory, US Government Resource | |
References | () https://www.kb.cert.org/vuls/id/257161/ - Mitigation, Third Party Advisory, US Government Resource | |
References | () https://www.treck.com - Product, Vendor Advisory |
24 Jul 2024, 16:22
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:dell:wyse_5030:-:*:*:*:*:*:*:* cpe:2.3:h:dell:wyse_5050_all-in-one:-:*:*:*:*:*:*:* cpe:2.3:o:dell:wyse_5030_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:dell:wyse_7030:-:*:*:*:*:*:*:* cpe:2.3:o:dell:wyse_5050_all-in-one_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:dell:wyse_7030_firmware:-:*:*:*:*:*:*:* |
|
First Time |
Dell
Dell wyse 7030 Dell wyse 7030 Firmware Dell wyse 5050 All-in-one Firmware Dell wyse 5030 Dell wyse 5050 All-in-one Dell wyse 5030 Firmware |
|
References | () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt - Third Party Advisory | |
References | () https://cwe.mitre.org/data/definitions/125.html - Technical Description | |
References | () https://security.netapp.com/advisory/ntap-20200625-0006/ - Third Party Advisory | |
References | () https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities - Third Party Advisory | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html - Third Party Advisory | |
References | () https://www.kb.cert.org/vuls/id/257161 - Third Party Advisory, US Government Resource |
Information
Published : 2020-06-17 11:15
Updated : 2024-11-21 04:58
NVD link : CVE-2020-11899
Mitre link : CVE-2020-11899
CVE.ORG link : CVE-2020-11899
JSON object : View
Products Affected
dell
- wyse_5050_all-in-one_firmware
- wyse_5030
- wyse_5050_all-in-one
- wyse_5030_firmware
- wyse_7030
- wyse_7030_firmware
treck
- tcp\/ip
CWE
CWE-125
Out-of-bounds Read