A vulnerability was found in AVL-DiTEST-DiagDev libdoip 1.0.0. It has been rated as problematic. This issue affects the function DoIPConnection::reactOnReceivedTcpMessage of the file DoIPConnection.cpp. The manipulation leads to null pointer dereference.
References
Link | Resource |
---|---|
https://github.com/AVL-DiTEST-DiagDev/libdoip/issues/11 | Exploit Issue Tracking Third Party Advisory |
https://vuldb.com/?ctiid.285659 | Permissions Required |
https://vuldb.com/?id.285659 | Third Party Advisory |
https://vuldb.com/?submit.443175 | Third Party Advisory |
Configurations
History
22 Nov 2024, 21:02
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:avlditest:libdoip:1.0.0:*:*:*:*:*:*:* | |
First Time |
Avlditest libdoip
Avlditest |
|
References | () https://github.com/AVL-DiTEST-DiagDev/libdoip/issues/11 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.285659 - Permissions Required | |
References | () https://vuldb.com/?id.285659 - Third Party Advisory | |
References | () https://vuldb.com/?submit.443175 - Third Party Advisory |
21 Nov 2024, 13:57
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-21 13:15
Updated : 2024-11-22 21:02
NVD link : CVE-2024-11588
Mitre link : CVE-2024-11588
CVE.ORG link : CVE-2024-11588
JSON object : View
Products Affected
avlditest
- libdoip