{"vulnerability": "CVE-2020-25927", "sightings": [{"uuid": "b65b1d05-4812-46bc-a435-8e8a5e8398e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25927", "type": "seen", "source": "https://t.me/cibsecurity/27560", "content": "\u203c CVE-2020-25927 \u203c\n\nThe DNS feature in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Out-of-bounds Read. The impact is: a denial of service (remote). The component is: DNS response processing in function: dns_upcall(). The attack vector is: a specific DNS response packet. The code does not check whether the number of queries/responses specified in the DNS packet header corresponds to the query/response data available in the DNS packet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-18T22:17:04.000000Z"}]}