CVE-2020-17441
Summary
| CVE | CVE-2020-17441 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-12-11 23:15:00 UTC |
| Updated | 2020-12-14 20:12:00 UTC |
| Description | An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 headers does not validate whether the IPv6 payload length field is equal to the actual size of the payload, which leads to an Out-of-Bounds read during the ICMPv6 checksum calculation, resulting in either Denial-of-Service or Information Disclosure. This affects pico_ipv6_extension_headers and pico_checksum_adder (in pico_ipv6.c and pico_frame.c). |
Risk And Classification
Problem Types: CWE-125
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Altran | Picotcp | All | All | All | All |
| Application | Microchip | Mplab Harmony | All | All | All | All |
| Application | Microchip | Mplab Harmony | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| VU#815128 - Embedded TCP/IP stacks have memory corruption vulnerabilities | MISC | www.kb.cert.org | Third Party Advisory, US Government Resource |
| Multiple Embedded TCP/IP Stacks | CISA | MISC | us-cert.cisa.gov | Third Party Advisory, US Government Resource |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.