First published: Wed May 10 2023(Updated: )
An out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no IP address argument is provided to the `PORT` command.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Weston-embedded Uc-ftps | =1.98.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-46377.
CVE-2022-46377 has a severity rating of 7.5 (High).
The affected software for CVE-2022-46377 is Weston Embedded uC-FTPs v 1.98.00.
CVE-2022-46377 is an out-of-bounds read vulnerability in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. An attacker can exploit this vulnerability by sending specially-crafted network packets to trigger a denial of service.
Yes, here are some references for CVE-2022-46377: - [GitHub Advisory](https://github.com/weston-embedded/uC-FTPs/pull/2) - [Talos Intelligence Vulnerability Report](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681)