First published: Tue Nov 14 2023(Updated: )
A heap-based buffer overflow vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Silabs Gecko Software Development Kit | =4.3.1 | |
Weston-embedded Cesium Net | =3.07.01 | |
Weston-embedded Uc-http | =3.01.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27882 is a heap-based buffer overflow vulnerability in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01.
CVE-2023-27882 affects the Silabs Gecko Software Development Kit version 4.3.1, Weston-embedded Cesium Net version 3.07.01, and Weston-embedded Uc-http version 3.01.01.
CVE-2023-27882 has a severity rating of 9, which is considered critical.
CVE-2023-27882 can be exploited by sending a specially crafted network packet to trigger a heap-based buffer overflow and potentially lead to code execution.
At the time of writing, there is no known fix for CVE-2023-27882. It is recommended to follow the recommendations provided by the vendor and apply any available security updates.