Filtered by vendor Butok
Subscriptions
Filtered by product Fnet
Subscriptions
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-27633 | 1 Butok | 1 Fnet | 2024-11-21 | 9.1 Critical |
In FNET 4.6.3, TCP ISNs are improperly random. | ||||
CVE-2020-24383 | 1 Butok | 1 Fnet | 2024-11-21 | 9.1 Critical |
An issue was discovered in FNET through 4.6.4. The code for processing resource records in mDNS queries doesn't check for proper '\0' termination of the resource record name string, leading to an out-of-bounds read, and potentially causing information leak or Denial-or-Service. | ||||
CVE-2020-17470 | 1 Butok | 1 Fnet | 2024-11-21 | 5.3 Medium |
An issue was discovered in FNET through 4.6.4. The code that initializes the DNS client interface structure does not set sufficiently random transaction IDs (they are always set to 1 in _fnet_dns_poll in fnet_dns.c). This significantly simplifies DNS cache poisoning attacks. | ||||
CVE-2020-17469 | 1 Butok | 1 Fnet | 2024-11-21 | 7.5 High |
An issue was discovered in FNET through 4.6.4. The code for IPv6 fragment reassembly tries to access a previous fragment starting from a network incoming fragment that still doesn't have a reference to the previous one (which supposedly resides in the reassembly list). When faced with an incoming fragment that belongs to a non-empty fragment list, IPv6 reassembly must check that there are no empty holes between the fragments: this leads to an uninitialized pointer dereference in _fnet_ip6_reassembly in fnet_ip6.c, and causes Denial-of-Service. | ||||
CVE-2020-17468 | 1 Butok | 1 Fnet | 2024-11-21 | 7.5 High |
An issue was discovered in FNET through 4.6.4. The code for processing the hop-by-hop header (in the IPv6 extension headers) doesn't check for a valid length of an extension header, and therefore an out-of-bounds read can occur in _fnet_ip6_ext_header_handler_options in fnet_ip6.c, leading to Denial-of-Service. | ||||
CVE-2020-17467 | 1 Butok | 1 Fnet | 2024-11-21 | 9.1 Critical |
An issue was discovered in FNET through 4.6.4. The code for processing the hostname from an LLMNR request doesn't check for '\0' termination. Therefore, the deduced length of the hostname doesn't reflect the correct length of the actual data. This may lead to Information Disclosure in _fnet_llmnr_poll in fnet_llmnr.c during a response to a malicious request of the DNS class IN. |
Page 1 of 1.