Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2020-27217
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In Eclipse Hono version 1.3.0 and 1.4.0 the AMQP protocol adapter does not verify the size of AMQP messages received from devices. In particular, a device may send messages that are bigger than the max-message-size that the protocol adapter has indicated during link establishment. While the AMQP 1.0 protocol explicitly disallows a peer to send such messages, a hand crafted AMQP 1.0 client could exploit this behavior in order to send a message of unlimited size to the adapter, eventually causing the adapter to fail with an out of memory exception.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-1284
Source: NVD (National Vulnerability Database)
Vulnerability Title
Eclipse Hono 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Eclipse Hono是Eclipse基金会的一个用于为所连接的 IOT 设备提供控制接口的软件。该软件连接大量的IOT设备,并提供对外提供统一的访问接口进行控制。 Eclipse Hono 1.3.0版本和1.4.0版本存在安全漏洞,该漏洞源于AMQP协议适配器不验证从设备接收到的AMQP消息的大小。特别是设备可以发送大于协议适配器在建立链路期间所指示的最大消息大小的消息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
The Eclipse FoundationEclipse Hono 1.3.0 -
II. Public POCs for CVE-2020-27217
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2020-27217
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2020-27217

No comments yet


Leave a comment