First published: Wed Jun 17 2020(Updated: )
The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Treck TCP/IP stack IPv6 | <6.0.1.66 | |
Treck TCP/IP stack IPv6 | ||
Treck Tcp\/ip | <6.0.1.66 | |
All of | ||
Dell Wyse 5050 All-in-one Firmware | ||
Dell Wyse 5050 All-in-one | ||
All of | ||
Dell Wyse 7030 Firmware | ||
Dell Wyse 7030 | ||
All of | ||
Dell Wyse 5030 Firmware | ||
Dell Wyse 5030 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11899 is a vulnerability in the Treck TCP/IP stack that allows for an out-of-bounds read in the IPv6 subsystem.
The severity of CVE-2020-11899 is medium with a CVSS score of 5.4.
The Treck TCP/IP stack IPv6 version 6.0.1.66 and earlier are affected by CVE-2020-11899.
To fix CVE-2020-11899, it is recommended to upgrade to a version of the Treck TCP/IP stack that is not affected by the vulnerability.
You can find more information about CVE-2020-11899 in the references provided: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt, https://cwe.mitre.org/data/definitions/125.html, and https://jsof-tech.com/vulnerability-disclosure-policy/