First published: Fri Nov 17 2017(Updated: )
picoTCP (versions 1.7.0 - 1.5.0) is vulnerable to stack buffer overflow resulting in code execution or denial of service attack
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Altran picoTCP | =1.5.0 | |
Altran picoTCP | =1.5.1 | |
Altran picoTCP | =1.6.0 | |
Altran picoTCP | =1.6.1 | |
Altran picoTCP | =1.6.2 | |
Altran picoTCP | =1.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2017-1000210.
The severity of CVE-2017-1000210 is critical with a severity value of 9.8.
picoTCP versions 1.7.0 to 1.5.0 are affected by CVE-2017-1000210.
An attacker can exploit CVE-2017-1000210 to achieve code execution or launch a denial of service attack.
Yes, there is a fix available for CVE-2017-1000210. Please refer to the provided reference link for more information.