CoAPthon3 vulnerable to Deserialization of Untrusted Data
High severity
GitHub Reviewed
Published
Apr 8, 2019
to the GitHub Advisory Database
•
Updated Sep 6, 2024
Description
Published to the GitHub Advisory Database
Apr 8, 2019
Reviewed
Jun 16, 2020
Last updated
Sep 6, 2024
The Serialize.deserialize() method in CoAPthon3 1.0 and 1.0.1 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, example collect CoAP server and client) when they receive crafted CoAP messages.
References