漏洞标题
Eclipse ThreadX NetX Duo HTTP 服务器单个PUT请求整数下溢
漏洞描述信息
在Eclipse ThreadX NetX Duo 6.4.2版本之前的功能中,NetX HTTP服务器存在一个漏洞。攻击者可以通过写入一个非常大的文件,或者通过精心构造的包含较小Content-Length值的数据包,使得该值小于另一数据包的数据请求大小,从而导致整数下溢并引发拒绝服务攻击。一种可能的解决方法是禁用HTTP PUT支持。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
漏洞类别
整数下溢(超界折返)
漏洞标题
Eclipse ThreadX NetX Duo HTTP server single PUT request integer underflow
漏洞描述信息
In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before
version 6.4.2, an attacker can cause an integer underflow and a
subsequent denial of service by writing a very large file, by specially
crafted packets with Content-Length in one packet smaller than the data
request size of the other packet. A possible workaround is to disable
HTTP PUT support.
CVSS信息
N/A
漏洞类别
整数下溢(超界折返)