CVE-2020-17440
Summary
| CVE | CVE-2020-17440 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-12-11 23:15:00 UTC |
| Updated | 2020-12-15 15:06:00 UTC |
| Description | An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that parses incoming DNS packets does not validate that domain names present in the DNS responses have '\0' termination. This results in errors when calculating the offset of the pointer that jumps over domain name bytes in DNS response packets when a name lacks this termination, and eventually leads to dereferencing the pointer at an invalid/arbitrary address, within newdata() and parse_name() in resolv.c. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Contiki-os | Contiki | 3.0 | All | All | All |
| Operating System | Contiki-os | Contiki | 3.0 | All | All | All |
| Application | Uip Project | Uip | 1.0 | All | All | All |
| Application | Uip Project | Uip | 1.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| VU#815128 - Embedded TCP/IP stacks have memory corruption vulnerabilities | MISC | www.kb.cert.org | Third Party Advisory, US Government Resource |
| Multiple Embedded TCP/IP Stacks | CISA | MISC | us-cert.cisa.gov | Third Party Advisory, US Government Resource |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.