CVE-2022-46378

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-46378
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-46378.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-46378
Published
2023-05-10T16:15:10Z
Modified
2025-02-14T11:40:14.402143Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no port argument is provided to the PORT command.

References

Affected packages

Git / github.com/weston-embedded/uc-ftps

Affected ranges

Type
GIT
Repo
https://github.com/weston-embedded/uc-ftps
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v1.*

v1.98.00