In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade zephyrproject-rtos/zephyr
to version 4.1.0-rc1 or higher.
Affected versions of this package are vulnerable to Out-of-bounds Read in the dns_validate_msg()
function in dns/resolve.c
. An attacker can cause a crash or incorrect computation by sending a packet with DNS ID of 0, QD count of 1, and a missing payload.
{0, 0, 128, 1, 0, 1, 0, 0, 0, 0, 0, 0};