First published: Wed Dec 09 2020(Updated: )
Out-of-bounds Write vulnerability in TCP stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying arbitrary urgent data pointer offsets within TCP packets including beyond the length of the packet.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache NuttX | <=9.1.0 | |
Apache NuttX | =10.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-17528 has a high severity level due to its potential to allow attackers to corrupt memory.
To fix CVE-2020-17528, upgrade Apache NuttX to version 10.0.1 or later.
CVE-2020-17528 affects Apache NuttX versions up to and including 9.1.0 and version 10.0.0.
CVE-2020-17528 is an out-of-bounds write vulnerability in the TCP stack of Apache NuttX.
Yes, CVE-2020-17528 can be exploited remotely by supplying malicious TCP packets.