Vulnerability Name: | CVE-2020-27638 (CCN-190410) | ||||||||||||
Assigned: | 2020-10-19 | ||||||||||||
Published: | 2020-10-19 | ||||||||||||
Updated: | 2022-04-28 | ||||||||||||
Summary: | receive.c in fastd before v21 allows denial of service (assertion failure) when receiving packets with an invalid type code. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-617 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-27638 Source: MISC Type: Issue Tracking, Third Party Advisory https://bugs.debian.org/972521 Source: CCN Type: Debian Bug report logs - #972521 receive: fix buffer leak when receiving invalid packets Source: XF Type: UNKNOWN fastd-cve202027638-dos(190410) Source: CCN Type: fastd Web site fastd v21 — fastd 21 documentation Source: MISC Type: Broken Link, Release Notes, Third Party Advisory https://fastd.readthedocs.io/en/stable/releases/v21.html Source: MISC Type: Patch, Third Party Advisory https://github.com/NeoRaider/fastd/commit/737925113363b6130879729cdff9ccc46c33eaea Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20201025 [SECURITY] [DLA-2414-1] fastd security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-13edfc3215 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-495c14a23f Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-01dc2bc62c Source: CCN Type: WhiteSource Vulnerability Database CVE-2020-27638 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: ![]() | ||||||||||||
BACK |