First published: Fri Dec 11 2020(Updated: )
An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that parses incoming DNS packets does not validate that domain names present in the DNS responses have '\0' termination. This results in errors when calculating the offset of the pointer that jumps over domain name bytes in DNS response packets when a name lacks this termination, and eventually leads to dereferencing the pointer at an invalid/arbitrary address, within newdata() and parse_name() in resolv.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Uip Project Uip | =1.0 | |
Contiki-os Contiki | =3.0 | |
Multiple (open source) picoTCP-NG, Version 1.7.0 and prior | ||
Multiple (open source) picoTCP (EOL), Version 1.7.0 and prior | ||
Multiple (open source) FNET, Version 4.6.3 | ||
Multiple (open source) Nut/Net, Version 5.1 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-17440 is a vulnerability in uIP 1.0 as used in Contiki 3.0 and other products.
CVE-2020-17440 allows attackers to cause denial-of-service conditions by sending specially crafted DNS packets.
The severity of CVE-2020-17440 is high, with a CVSS score of 7.5.
To fix CVE-2020-17440, update to a patched version of uIP or Contiki that addresses the vulnerability.
You can find more information about CVE-2020-17440 at the following references: [https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01](https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01) and [https://www.kb.cert.org/vuls/id/815128](https://www.kb.cert.org/vuls/id/815128)