Overview
- Description
- Out-of-bounds Write vulnerability in TCP Stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying and invalid fragmentation offset value specified in the IP header. This is only impacts builds with both CONFIG_EXPERIMENTAL and CONFIG_NET_TCP_REASSEMBLY build flags enabled.
- Source
- security@apache.org
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:nuttx:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA1E7044-57DF-4956-BFB8-350EC7DC0428", "versionEndIncluding": "9.1.0" }, { "criteria": "cpe:2.3:a:apache:nuttx:10.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2710888-C209-4CC2-AEB8-E606B2EDF5E0" } ], "operator": "OR" } ] } ]