Description
An issue was discovered in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a long message in a TCP request that leads to std::length_error.
References (2)
Core 2
Core References
Patch, Third Party Advisory
https://github.com/drachtio/drachtio-server/commit/4cf9fe2c420b86c16442215d449d40be777c1911
Exploit, Third Party Advisory
https://github.com/drachtio/drachtio-server/issues/245
Scores
CVSS v3
7.5
EPSS
0.0067
EPSS Percentile
71.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-170
Status
published
Products (1)
drachtio/drachtio-server
< 0.8.20
Published
Dec 18, 2022
Tracked Since
Feb 18, 2026