Overview
- Description
- The Serialize.deserialize() method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, CoAP reverse proxy, example collect CoAP server and client) when they receive crafted CoAP messages.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-502
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:coapthon_project:coapthon:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5E3FFD2-EAC6-4CB4-A6D0-59FAD7778E35" }, { "criteria": "cpe:2.3:a:coapthon_project:coapthon:4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D3604C6-8B56-4D11-A365-7A4CD9468A4D" }, { "criteria": "cpe:2.3:a:coapthon_project:coapthon:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0AD3FFD8-6A70-4ADA-93EB-1D16F413A752" }, { "criteria": "cpe:2.3:a:coapthon_project:coapthon:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B1FFE51-DA7F-467A-9D0F-42771CC4C005" } ], "operator": "OR" } ] } ]