We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in AVL-DiTEST-DiagDev libdoip 1.0.0. It has been rated as problematic. This issue affects the function DoIPConnection::reactOnReceivedTcpMessage of the file DoIPConnection.cpp. The manipulation leads to null pointer dereference.
Eine Schwachstelle wurde in AVL-DiTEST-DiagDev libdoip 1.0.0 ausgemacht. Sie wurde als problematisch eingestuft. Hierbei geht es um die Funktion DoIPConnection::reactOnReceivedTcpMessage der Datei DoIPConnection.cpp. Dank der Manipulation mit unbekannten Daten kann eine null pointer dereference-Schwachstelle ausgenutzt werden.
2024-11-21: | Advisory disclosed |
2024-11-21: | VulDB entry created |
2024-11-21: | VulDB entry last update |
susu199 (VulDB User)
vuldb.com/?id.285659 (VDB-285659 | AVL-DiTEST-DiagDev libdoip DoIPConnection.cpp reactOnReceivedTcpMessage null pointer dereference)
vuldb.com/?ctiid.285659 (VDB-285659 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.443175 (Submit #443175 | AVL-DiTEST-DiagDev libdoip libdoip==1.0.0 NULL Pointer Dereference)
github.com/AVL-DiTEST-DiagDev/libdoip/issues/11
Support options