First published: Tue Nov 14 2023(Updated: )
A memory corruption vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Silabs Gecko Software Development Kit | =4.3.1 | |
Weston-embedded Cesium Net | =3.07.01 | |
Weston-embedded Uc-http | =3.01.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28379 is a memory corruption vulnerability that exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01.
CVE-2023-28379 affects Silabs Gecko Software Development Kit version 4.3.1.
CVE-2023-28379 affects Weston-embedded Cesium Net version 3.07.01.
CVE-2023-28379 affects Weston-embedded Uc-http version 3.01.01.
CVE-2023-28379 has a severity rating of critical with a value of 9.