7.5
CWE
824 125
Advisory Published
Updated

CVE-2020-17469

First published: Fri Dec 11 2020(Updated: )

An issue was discovered in FNET through 4.6.4. The code for IPv6 fragment reassembly tries to access a previous fragment starting from a network incoming fragment that still doesn't have a reference to the previous one (which supposedly resides in the reassembly list). When faced with an incoming fragment that belongs to a non-empty fragment list, IPv6 reassembly must check that there are no empty holes between the fragments: this leads to an uninitialized pointer dereference in _fnet_ip6_reassembly in fnet_ip6.c, and causes Denial-of-Service.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
butok FNET<=4.6.4
Contiki OS
Contiki-NG
uIP
SUSE Open-iSCSI
altran picoTCP-NG
picoTCP
butok FNET
Nut/Net

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2020-17469?

    CVE-2020-17469 is classified as a medium severity vulnerability.

  • How do I fix CVE-2020-17469?

    To fix CVE-2020-17469, update the affected software to the latest version provided by the vendor.

  • What systems are affected by CVE-2020-17469?

    CVE-2020-17469 affects multiple open-source software including FNET, uIP-Contiki-OS, Contiki-NG, and open-iscsi.

  • What kind of attack can exploit CVE-2020-17469?

    CVE-2020-17469 can potentially be exploited through IPv6 fragment reassembly attacks.

  • Is CVE-2020-17469 a zero-day vulnerability?

    CVE-2020-17469 is not a zero-day vulnerability since a patch has been made available.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203