First published: Fri Dec 11 2020(Updated: )
An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. When an unsupported TCP option with zero length is provided in an incoming TCP packet, it is possible to cause a Denial-of-Service by achieving an infinite loop in the code that parses TCP options, aka tcp_parse_options() in pico_tcp.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Altran picoTCP | <=1.7.0 | |
Altran Picotcp-ng | <=1.7.0 | |
Multiple (open source) picoTCP-NG, Version 1.7.0 and prior | ||
Multiple (open source) picoTCP (EOL), Version 1.7.0 and prior | ||
Multiple (open source) FNET, Version 4.6.3 | ||
Multiple (open source) Nut/Net, Version 5.1 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24337 is a vulnerability discovered in picoTCP and picoTCP-NG through 1.7.0 that allows for a Denial-of-Service attack by achieving an infinite loop.
The severity of CVE-2020-24337 is high, with a CVSS score of 7.5.
The vulnerability affects picoTCP and picoTCP-NG versions up to and including 1.7.0.
To fix CVE-2020-24337, users should update their picoTCP and picoTCP-NG installations to a version beyond 1.7.0.
More information about CVE-2020-24337 can be found at the following links: [US-CERT Advisory](https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01) and [CERT Vulnerability Note](https://www.kb.cert.org/vuls/id/815128).