First published: Fri Dec 11 2020(Updated: )
An issue was discovered in FNET through 4.6.4. The code for IPv6 fragment reassembly tries to access a previous fragment starting from a network incoming fragment that still doesn't have a reference to the previous one (which supposedly resides in the reassembly list). When faced with an incoming fragment that belongs to a non-empty fragment list, IPv6 reassembly must check that there are no empty holes between the fragments: this leads to an uninitialized pointer dereference in _fnet_ip6_reassembly in fnet_ip6.c, and causes Denial-of-Service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
butok FNET | <=4.6.4 | |
Contiki OS | ||
Contiki-NG | ||
uIP | ||
SUSE Open-iSCSI | ||
altran picoTCP-NG | ||
picoTCP | ||
butok FNET | ||
Nut/Net |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-17469 is classified as a medium severity vulnerability.
To fix CVE-2020-17469, update the affected software to the latest version provided by the vendor.
CVE-2020-17469 affects multiple open-source software including FNET, uIP-Contiki-OS, Contiki-NG, and open-iscsi.
CVE-2020-17469 can potentially be exploited through IPv6 fragment reassembly attacks.
CVE-2020-17469 is not a zero-day vulnerability since a patch has been made available.