DescriptionAn issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The DNS response data length is not checked (it can be set to an arbitrary value from a packet). This may lead to successful Denial-of-Service, and possibly Remote Code Execution.
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
Note from the SUSE Security TeamSUSE does not ship the Nut/Net IP stack, so it is not affected by this problem. SUSE Bugzilla entry: 1179907 [NEW] No SUSE Security Announcements cross referenced.
SUSE Timeline for this CVECVE page created: Thu Dec 10 17:28:55 2020
CVE page last modified: Fri Oct 7 12:50:58 2022