Search criteria

9 vulnerabilities found for ud3tn by d3tn

FKIE_CVE-2025-8183

Vulnerability from fkie_nvd - Published: 2025-07-25 10:15 - Updated: 2025-08-11 18:59
Summary
NULL Pointer Dereference in µD3TN via non-singleton destination Endpoint Identifier allows remote attacker to reliably cause DoS
References
Impacted products
Vendor Product Version
d3tn ud3tn 0.14.3

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:d3tn:ud3tn:0.14.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "035453A3-AB24-477C-83C0-C6DEBE94C331",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "NULL Pointer Dereference in \u00b5D3TN via non-singleton destination Endpoint Identifier allows remote attacker to reliably cause DoS"
    },
    {
      "lang": "es",
      "value": "La desreferencia de puntero nulo en \u00b5D3TN a trav\u00e9s de un identificador de endpoint de destino no singleton permite que un atacante remoto cause de manera confiable un ataque de denegaci\u00f3n de servicio (DoS)."
    }
  ],
  "id": "CVE-2025-8183",
  "lastModified": "2025-08-11T18:59:06.500",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "cve@gitlab.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-07-25T10:15:36.647",
  "references": [
    {
      "source": "cve@gitlab.com",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://gitlab.com/d3tn/ud3tn/-/issues/255"
    }
  ],
  "sourceIdentifier": "cve@gitlab.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "cve@gitlab.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2024-12107

Vulnerability from fkie_nvd - Published: 2024-12-04 11:15 - Updated: 2025-08-05 17:42
Summary
Double-Free Vulnerability in uD3TN BPv7 Caused by Malformed Endpoint Identifier allows remote attacker to reliably cause DoS
References
Impacted products
Vendor Product Version
d3tn ud3tn 0.13.0
d3tn ud3tn 0.14.1
d3tn ud3tn 0.14.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:d3tn:ud3tn:0.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0F50D0A-B89C-4F55-AB41-A384E3FFA54D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:d3tn:ud3tn:0.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2917FA87-4A47-4796-B891-8D311C41A47A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:d3tn:ud3tn:0.14.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AED3B8F-0A00-4D64-A13A-C7FDD527C6E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Double-Free Vulnerability in uD3TN BPv7 Caused by Malformed Endpoint Identifier allows remote attacker to reliably cause DoS"
    },
    {
      "lang": "es",
      "value": " La vulnerabilidad de Double-Free en uD3TN BPv7 causada por un identificador de endpoint malformado permite que un atacante remoto cause un ataque DoS de manera confiable"
    }
  ],
  "id": "CVE-2024-12107",
  "lastModified": "2025-08-05T17:42:59.487",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "cve@gitlab.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-04T11:15:05.000",
  "references": [
    {
      "source": "cve@gitlab.com",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://gitlab.com/d3tn/ud3tn/-/issues/233"
    }
  ],
  "sourceIdentifier": "cve@gitlab.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-415"
        }
      ],
      "source": "cve@gitlab.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2024-10455

Vulnerability from fkie_nvd - Published: 2024-10-28 14:15 - Updated: 2025-08-07 19:17
Summary
Reachable Assertion in BPv7 parser in µD3TN v0.14.0 allows attacker to disrupt service via malformed Extension Block
References
Impacted products
Vendor Product Version
d3tn ud3tn 0.14.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:d3tn:ud3tn:0.14.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "5DE72063-E5FE-420B-8C21-5D26A7F5C32F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Reachable Assertion in BPv7 parser in \u00b5D3TN v0.14.0 allows attacker to disrupt service via malformed Extension Block"
    },
    {
      "lang": "es",
      "value": "La aserci\u00f3n alcanzable en el analizador BPv7 en \u00b5D3TN v0.14.0 permite que un atacante interrumpa el servicio a trav\u00e9s de un bloque de extensi\u00f3n mal formado"
    }
  ],
  "id": "CVE-2024-10455",
  "lastModified": "2025-08-07T19:17:55.040",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "cve@gitlab.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-10-28T14:15:04.423",
  "references": [
    {
      "source": "cve@gitlab.com",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://gitlab.com/d3tn/ud3tn/-/issues/227"
    }
  ],
  "sourceIdentifier": "cve@gitlab.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-617"
        }
      ],
      "source": "cve@gitlab.com",
      "type": "Secondary"
    }
  ]
}

CVE-2025-8183 (GCVE-0-2025-8183)

Vulnerability from cvelistv5 – Published: 2025-07-25 09:33 – Updated: 2025-07-25 12:41
VLAI?
Title
NULL Pointer Dereference in µD3TN
Summary
NULL Pointer Dereference in µD3TN via non-singleton destination Endpoint Identifier allows remote attacker to reliably cause DoS
CWE
  • CWE-476 - NULL Pointer Dereference
Assigner
References
https://gitlab.com/d3tn/ud3tn/-/issues/255 issue-trackingpermissions-required
Impacted products
Vendor Product Version
D3TN GmbH µD3TN Affected: 0 , < 0.14.3 (semver)
Create a notification for this product.
Credits
stephan.havermans@imdea.org
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-8183",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-25T12:41:32.126850Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-25T12:41:43.798Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "\u00b5D3TN",
          "vendor": "D3TN GmbH",
          "versions": [
            {
              "lessThan": "0.14.3",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "stephan.havermans@imdea.org"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "NULL Pointer Dereference in \u00b5D3TN via non-singleton destination Endpoint Identifier allows remote attacker to reliably cause DoS"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-476",
              "description": "CWE-476: NULL Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-25T09:33:41.854Z",
        "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
        "shortName": "GitLab"
      },
      "references": [
        {
          "name": "GitLab Issue #255",
          "tags": [
            "issue-tracking",
            "permissions-required"
          ],
          "url": "https://gitlab.com/d3tn/ud3tn/-/issues/255"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to version 0.14.3"
        }
      ],
      "title": "NULL Pointer Dereference in \u00b5D3TN"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
    "assignerShortName": "GitLab",
    "cveId": "CVE-2025-8183",
    "datePublished": "2025-07-25T09:33:41.854Z",
    "dateReserved": "2025-07-25T08:33:09.683Z",
    "dateUpdated": "2025-07-25T12:41:43.798Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-12107 (GCVE-0-2024-12107)

Vulnerability from cvelistv5 – Published: 2024-12-04 10:54 – Updated: 2024-12-04 14:40
VLAI?
Title
Double Free in µD3TN
Summary
Double-Free Vulnerability in uD3TN BPv7 Caused by Malformed Endpoint Identifier allows remote attacker to reliably cause DoS
CWE
Assigner
References
https://gitlab.com/d3tn/ud3tn/-/issues/233 issue-trackingpermissions-required
Impacted products
Vendor Product Version
D3TN GmbH µD3TN Affected: 0 , < 0.14.2 (semver)
Create a notification for this product.
Credits
stephan.havermans@imdea.org
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:d3tn:ud3tn:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "ud3tn",
            "vendor": "d3tn",
            "versions": [
              {
                "lessThan": "0.14.2",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-12107",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T14:39:04.575181Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T14:40:33.859Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "\u00b5D3TN",
          "vendor": "D3TN GmbH",
          "versions": [
            {
              "lessThan": "0.14.2",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "stephan.havermans@imdea.org"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Double-Free Vulnerability in uD3TN BPv7 Caused by Malformed Endpoint Identifier allows remote attacker to reliably cause DoS"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-415",
              "description": "CWE-415: Double Free",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-04T10:54:51.452Z",
        "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
        "shortName": "GitLab"
      },
      "references": [
        {
          "name": "GitLab Issue #233",
          "tags": [
            "issue-tracking",
            "permissions-required"
          ],
          "url": "https://gitlab.com/d3tn/ud3tn/-/issues/233"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to version 0.14.2"
        }
      ],
      "title": "Double Free in \u00b5D3TN"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
    "assignerShortName": "GitLab",
    "cveId": "CVE-2024-12107",
    "datePublished": "2024-12-04T10:54:51.452Z",
    "dateReserved": "2024-12-03T17:30:39.687Z",
    "dateUpdated": "2024-12-04T14:40:33.859Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-10455 (GCVE-0-2024-10455)

Vulnerability from cvelistv5 – Published: 2024-10-28 13:30 – Updated: 2024-10-28 13:47
VLAI?
Title
Reachable Assertion in µD3TN
Summary
Reachable Assertion in BPv7 parser in µD3TN v0.14.0 allows attacker to disrupt service via malformed Extension Block
CWE
Assigner
References
https://gitlab.com/d3tn/ud3tn/-/issues/227 issue-trackingpermissions-required
Impacted products
Vendor Product Version
D3TN µD3TN Affected: 0 , < 0.14.1 (semver)
Create a notification for this product.
Credits
Stephan Havermans <stephan.havermans@imdea.org>
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:d3tn:ud3tn:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ud3tn",
            "vendor": "d3tn",
            "versions": [
              {
                "lessThan": "0.14.1",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-10455",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-28T13:46:29.026813Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-28T13:47:59.719Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "\u00b5D3TN",
          "vendor": "D3TN",
          "versions": [
            {
              "lessThan": "0.14.1",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Stephan Havermans \u003cstephan.havermans@imdea.org\u003e"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Reachable Assertion in BPv7 parser in \u00b5D3TN v0.14.0 allows attacker to disrupt service via malformed Extension Block"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-617",
              "description": "CWE-617: Reachable Assertion",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-28T13:30:37.619Z",
        "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
        "shortName": "GitLab"
      },
      "references": [
        {
          "name": "GitLab Issue #227",
          "tags": [
            "issue-tracking",
            "permissions-required"
          ],
          "url": "https://gitlab.com/d3tn/ud3tn/-/issues/227"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "upgrade to v0.14.1"
        }
      ],
      "title": "Reachable Assertion in \u00b5D3TN"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
    "assignerShortName": "GitLab",
    "cveId": "CVE-2024-10455",
    "datePublished": "2024-10-28T13:30:37.619Z",
    "dateReserved": "2024-10-28T11:02:02.419Z",
    "dateUpdated": "2024-10-28T13:47:59.719Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-8183 (GCVE-0-2025-8183)

Vulnerability from nvd – Published: 2025-07-25 09:33 – Updated: 2025-07-25 12:41
VLAI?
Title
NULL Pointer Dereference in µD3TN
Summary
NULL Pointer Dereference in µD3TN via non-singleton destination Endpoint Identifier allows remote attacker to reliably cause DoS
CWE
  • CWE-476 - NULL Pointer Dereference
Assigner
References
https://gitlab.com/d3tn/ud3tn/-/issues/255 issue-trackingpermissions-required
Impacted products
Vendor Product Version
D3TN GmbH µD3TN Affected: 0 , < 0.14.3 (semver)
Create a notification for this product.
Credits
stephan.havermans@imdea.org
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-8183",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-25T12:41:32.126850Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-25T12:41:43.798Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "\u00b5D3TN",
          "vendor": "D3TN GmbH",
          "versions": [
            {
              "lessThan": "0.14.3",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "stephan.havermans@imdea.org"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "NULL Pointer Dereference in \u00b5D3TN via non-singleton destination Endpoint Identifier allows remote attacker to reliably cause DoS"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-476",
              "description": "CWE-476: NULL Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-25T09:33:41.854Z",
        "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
        "shortName": "GitLab"
      },
      "references": [
        {
          "name": "GitLab Issue #255",
          "tags": [
            "issue-tracking",
            "permissions-required"
          ],
          "url": "https://gitlab.com/d3tn/ud3tn/-/issues/255"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to version 0.14.3"
        }
      ],
      "title": "NULL Pointer Dereference in \u00b5D3TN"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
    "assignerShortName": "GitLab",
    "cveId": "CVE-2025-8183",
    "datePublished": "2025-07-25T09:33:41.854Z",
    "dateReserved": "2025-07-25T08:33:09.683Z",
    "dateUpdated": "2025-07-25T12:41:43.798Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-12107 (GCVE-0-2024-12107)

Vulnerability from nvd – Published: 2024-12-04 10:54 – Updated: 2024-12-04 14:40
VLAI?
Title
Double Free in µD3TN
Summary
Double-Free Vulnerability in uD3TN BPv7 Caused by Malformed Endpoint Identifier allows remote attacker to reliably cause DoS
CWE
Assigner
References
https://gitlab.com/d3tn/ud3tn/-/issues/233 issue-trackingpermissions-required
Impacted products
Vendor Product Version
D3TN GmbH µD3TN Affected: 0 , < 0.14.2 (semver)
Create a notification for this product.
Credits
stephan.havermans@imdea.org
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:d3tn:ud3tn:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "ud3tn",
            "vendor": "d3tn",
            "versions": [
              {
                "lessThan": "0.14.2",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-12107",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T14:39:04.575181Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T14:40:33.859Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "\u00b5D3TN",
          "vendor": "D3TN GmbH",
          "versions": [
            {
              "lessThan": "0.14.2",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "stephan.havermans@imdea.org"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Double-Free Vulnerability in uD3TN BPv7 Caused by Malformed Endpoint Identifier allows remote attacker to reliably cause DoS"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-415",
              "description": "CWE-415: Double Free",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-04T10:54:51.452Z",
        "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
        "shortName": "GitLab"
      },
      "references": [
        {
          "name": "GitLab Issue #233",
          "tags": [
            "issue-tracking",
            "permissions-required"
          ],
          "url": "https://gitlab.com/d3tn/ud3tn/-/issues/233"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to version 0.14.2"
        }
      ],
      "title": "Double Free in \u00b5D3TN"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
    "assignerShortName": "GitLab",
    "cveId": "CVE-2024-12107",
    "datePublished": "2024-12-04T10:54:51.452Z",
    "dateReserved": "2024-12-03T17:30:39.687Z",
    "dateUpdated": "2024-12-04T14:40:33.859Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-10455 (GCVE-0-2024-10455)

Vulnerability from nvd – Published: 2024-10-28 13:30 – Updated: 2024-10-28 13:47
VLAI?
Title
Reachable Assertion in µD3TN
Summary
Reachable Assertion in BPv7 parser in µD3TN v0.14.0 allows attacker to disrupt service via malformed Extension Block
CWE
Assigner
References
https://gitlab.com/d3tn/ud3tn/-/issues/227 issue-trackingpermissions-required
Impacted products
Vendor Product Version
D3TN µD3TN Affected: 0 , < 0.14.1 (semver)
Create a notification for this product.
Credits
Stephan Havermans <stephan.havermans@imdea.org>
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:d3tn:ud3tn:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ud3tn",
            "vendor": "d3tn",
            "versions": [
              {
                "lessThan": "0.14.1",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-10455",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-28T13:46:29.026813Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-28T13:47:59.719Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "\u00b5D3TN",
          "vendor": "D3TN",
          "versions": [
            {
              "lessThan": "0.14.1",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Stephan Havermans \u003cstephan.havermans@imdea.org\u003e"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Reachable Assertion in BPv7 parser in \u00b5D3TN v0.14.0 allows attacker to disrupt service via malformed Extension Block"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-617",
              "description": "CWE-617: Reachable Assertion",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-28T13:30:37.619Z",
        "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
        "shortName": "GitLab"
      },
      "references": [
        {
          "name": "GitLab Issue #227",
          "tags": [
            "issue-tracking",
            "permissions-required"
          ],
          "url": "https://gitlab.com/d3tn/ud3tn/-/issues/227"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "upgrade to v0.14.1"
        }
      ],
      "title": "Reachable Assertion in \u00b5D3TN"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a",
    "assignerShortName": "GitLab",
    "cveId": "CVE-2024-10455",
    "datePublished": "2024-10-28T13:30:37.619Z",
    "dateReserved": "2024-10-28T11:02:02.419Z",
    "dateUpdated": "2024-10-28T13:47:59.719Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}