First published: Tue Dec 01 2020(Updated: )
An issue was discovered in Contiki through 3.0. An Integer Overflow exists in the uIP TCP/IP Stack component when parsing TCP MSS options of IPv4 network packets in uip_process in net/ipv4/uip.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Contiki-ng Contiki-ng | <=3.0 | |
ubuntu/open-iscsi | <2.1.3-1ubuntu1 | 2.1.3-1ubuntu1 |
ubuntu/open-iscsi | <2.0.874-5ubuntu2.11+ | 2.0.874-5ubuntu2.11+ |
ubuntu/open-iscsi | <2.0.874-7.1ubuntu6.4 | 2.0.874-7.1ubuntu6.4 |
ubuntu/open-iscsi | <2.1.3-1ubuntu1 | 2.1.3-1ubuntu1 |
ubuntu/open-iscsi | <2.1.3 | 2.1.3 |
ubuntu/open-iscsi | <2.0.873+ | 2.0.873+ |
ubuntu/open-iscsi | <2.1.3-1ubuntu1 | 2.1.3-1ubuntu1 |
ubuntu/open-iscsi | <2.1.3-1ubuntu1 | 2.1.3-1ubuntu1 |
ubuntu/open-iscsi | <2.1.3-1ubuntu1 | 2.1.3-1ubuntu1 |
debian/open-iscsi | <=2.0.874-7.1 | 2.1.3-5 2.1.8-1 2.1.9-3 |
Multiple (open source) picoTCP-NG, Version 1.7.0 and prior | ||
Multiple (open source) picoTCP (EOL), Version 1.7.0 and prior | ||
Multiple (open source) FNET, Version 4.6.3 | ||
Multiple (open source) Nut/Net, Version 5.1 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID of this vulnerability is CVE-2020-13988.
The severity level of CVE-2020-13988 is high with a CVSS score of 7.5.
The affected software versions for CVE-2020-13988 include Contiki through version 3.0 and open-iscsi versions 2.0.874-5ubuntu2.11+ to 2.1.3-1ubuntu1.
To fix CVE-2020-13988, update to Contiki version 3.0 or later and open-iscsi version 2.1.3-1ubuntu1 or later.
You can find more information about CVE-2020-13988 at the following references: [1](https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01), [2](https://www.kb.cert.org/vuls/id/815128), [3](https://launchpad.net/bugs/cve/CVE-2020-13988).