In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade eclipse-threadx/netxduo
to version 6.4.2 or higher.
Affected versions of this package are vulnerable to Integer Underflow (Wrap or Wraparound) through the handling of HTTP PUT requests. An attacker can cause a system crash and service disruption by sending specially crafted packets with a Content-Length
header smaller than the actual data size.
Users who are not able to upgrade to the fixed version can disable the processing of PUT
requests by ending the processing of a PUT
request in an application callback request notify function.