A vulnerability was found in AVL-DiTEST-DiagDev libdoip 1.0.0. It has been rated as problematic. This issue affects the function DoIPConnection::reactOnReceivedTcpMessage of the file DoIPConnection.cpp. The manipulation leads to null pointer dereference.
The product does not release or incorrectly releases a resource before it is made available for re-use.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://vuldb.com/?id.285659 | vdb entry third party advisory technical description |
https://vuldb.com/?ctiid.285659 | permissions required signature |
https://vuldb.com/?submit.443175 | third party advisory |
https://github.com/AVL-DiTEST-DiagDev/libdoip/issues/11 | issue tracking third party advisory exploit |