Vulnerability Name: | CVE-2020-11904 (CCN-183507) | ||||||||||||
Assigned: | 2020-06-16 | ||||||||||||
Published: | 2020-06-16 | ||||||||||||
Updated: | 2020-07-22 | ||||||||||||
Summary: | The Treck TCP/IP stack before 6.0.1.66 has an Integer Overflow during Memory Allocation that causes an Out-of-Bounds Write. | ||||||||||||
CVSS v3 Severity: | 7.3 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) 6.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
4.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-787 CWE-190 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-11904 Source: CONFIRM Type: UNKNOWN http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt Source: CCN Type: US-CERT VU#257161 Treck IP stacks contain multiple vulnerabilities Source: XF Type: UNKNOWN treck-cve202011904-overflow(183507) Source: MISC Type: Third Party Advisory https://jsof-tech.com/vulnerability-disclosure-policy/ Source: CONFIRM Type: UNKNOWN https://security.netapp.com/advisory/ntap-20200625-0006/ Source: CCN Type: Cisco Security Advisory cisco-sa-treck-ip-stack-JyBQ5GyC Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020 Source: CISCO Type: Third Party Advisory 20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020 Source: CCN Type: Treck Web site Treck TCP/IP Stack Source: MISC Type: UNKNOWN https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities Source: CCN Type: JSOF Web site 19 Zero-Day Vulnerabilities Amplified by the Supply Chain Source: MISC Type: Exploit, Third Party Advisory https://www.jsof-tech.com/ripple20/ Source: CERT-VN Type: UNKNOWN VU#257161 Source: MISC Type: Mitigation, Third Party Advisory, US Government Resource https://www.kb.cert.org/vuls/id/257161/ Source: MISC Type: Product, Vendor Advisory https://www.treck.com Source: CCN Type: ICSA-20-168-01 Treck TCP/IP Stack | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |