logo

CVE-2018-12680 coapthon

Package

Manager: pip
Name: coapthon
Vulnerable Version: >=0 <=4.0.2

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00175 pctl0.39333

Details

CoAPthon DoS due to Exceptions The `Serialize.deserialize()` method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, CoAP reverse proxy, example collect CoAP server and client) when they receive crafted CoAP messages.

Metadata

Created: 2019-04-08T15:19:01Z
Modified: 2024-09-13T14:31:59Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/04/GHSA-5xc6-fpc7-4qvg/GHSA-5xc6-fpc7-4qvg.json
CWE IDs: ["CWE-400", "CWE-502"]
Alternative ID: GHSA-5xc6-fpc7-4qvg
Finding: F002
Auto approve: 1