Stack-based Buffer Overflow vulnerability in libmodbus v3.1.10 allows to overflow the buffer allocated for the Modbus response if the function tries to reply to a Modbus request with an unexpected length.
{ "binaries": [ { "binary_version": "3.1.6-2", "binary_name": "libmodbus-dev" }, { "binary_version": "3.1.6-2", "binary_name": "libmodbus5" } ] }
{ "binaries": [ { "binary_version": "3.1.10-1ubuntu1", "binary_name": "libmodbus-dev" }, { "binary_version": "3.1.10-1ubuntu1", "binary_name": "libmodbus5" } ] }
{ "binaries": [ { "binary_version": "3.0.5-1ubuntu0.1~esm1", "binary_name": "libmodbus-dev" }, { "binary_version": "3.0.5-1ubuntu0.1~esm1", "binary_name": "libmodbus5" } ] }
{ "binaries": [ { "binary_version": "3.0.6-1ubuntu0.1~esm1", "binary_name": "libmodbus-dev" }, { "binary_version": "3.0.6-1ubuntu0.1~esm1", "binary_name": "libmodbus5" } ] }
{ "binaries": [ { "binary_version": "3.0.6-2+deb9u1build0.18.04.1", "binary_name": "libmodbus-dev" }, { "binary_version": "3.0.6-2+deb9u1build0.18.04.1", "binary_name": "libmodbus5" } ] }