First published: Fri Dec 11 2020(Updated: )
An issue was discovered in picoTCP 1.7.0. The code for creating an ICMPv6 echo replies doesn't check whether the ICMPv6 echo request packet's size is shorter than 8 bytes. If the size of the incoming ICMPv6 request packet is shorter than this, the operation that calculates the size of the ICMPv6 echo replies has an integer wrap around, leading to memory corruption and, eventually, Denial-of-Service in pico_icmp6_send_echoreply_not_frag in pico_icmp6.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Altran picoTCP | <=1.7.0 | |
Multiple (open source) picoTCP-NG, Version 1.7.0 and prior | ||
Multiple (open source) picoTCP (EOL), Version 1.7.0 and prior | ||
Multiple (open source) FNET, Version 4.6.3 | ||
Multiple (open source) Nut/Net, Version 5.1 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-17443 is a vulnerability in picoTCP 1.7.0 that allows an attacker to create ICMPv6 echo replies without checking the size of the request packet.
CVE-2020-17443 has a severity rating of 7.5 (high).
CVE-2020-17443 affects picoTCP 1.7.0 by not checking the size of the incoming ICMPv6 echo request packet, potentially leading to issues.
To fix CVE-2020-17443, update picoTCP to version 1.7.1 or higher.
For more information about CVE-2020-17443, you can refer to the following references: [link 1](https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01) and [link 2](https://www.kb.cert.org/vuls/id/815128).