First published: Tue Feb 02 2021(Updated: )
An issue was discovered in uIP through 1.0, as used in Contiki and Contiki-NG. Domain name parsing lacks bounds checks, allowing an attacker to corrupt memory with crafted DNS packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Uip Project Uip | <=1.0 | |
Contiki-ng Contiki-ng | ||
Contiki-os Contiki | ||
Multiple (open source) picoTCP-NG, Version 1.7.0 and prior | ||
Multiple (open source) picoTCP (EOL), Version 1.7.0 and prior | ||
Multiple (open source) FNET, Version 4.6.3 | ||
Multiple (open source) Nut/Net, Version 5.1 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-24335.
The affected software is uIP through version 1.0, as used in Contiki and Contiki-NG.
The severity of CVE-2020-24335 is high with a CVSS score of 7.5.
An attacker can exploit this vulnerability by sending crafted DNS packets to the affected system.
Patch information for CVE-2020-24335 can be found in the references provided.