Vulnerability Description
An out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no IP address argument is provided to the `PORT` command.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Weston-Embedded | Uc-Ftps | 1.98.00 |
Related Weaknesses (CWE)
References
- https://github.com/weston-embedded/uC-FTPs/pull/2Patch
- https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681ExploitMitigationThird Party Advisory
- https://github.com/weston-embedded/uC-FTPs/pull/2Patch
- https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681ExploitMitigationThird Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1681
FAQ
What is CVE-2022-46377?
CVE-2022-46377 is a vulnerability with a CVSS score of 6.5 (MEDIUM). An out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of...
How severe is CVE-2022-46377?
CVE-2022-46377 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-46377?
Check the references section above for vendor advisories and patch information. Affected products include: Weston-Embedded Uc-Ftps.