First published: Fri Dec 11 2020(Updated: )
An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. The DNS domain name record decompression functionality in pico_dns_decompress_name() in pico_dns_common.c does not validate the compression pointer offset values with respect to the actual data present in a DNS response packet, causing out-of-bounds reads that lead to Denial-of-Service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Altran picoTCP | <=1.7.0 | |
Altran Picotcp-ng | <=1.7.0 | |
Multiple (open source) picoTCP-NG, Version 1.7.0 and prior | ||
Multiple (open source) picoTCP (EOL), Version 1.7.0 and prior | ||
Multiple (open source) FNET, Version 4.6.3 | ||
Multiple (open source) Nut/Net, Version 5.1 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-24339 is high.
The affected software for CVE-2020-24339 is Altran picoTCP and Altran Picotcp-ng versions up to and including 1.7.0.
CVE-2020-24339 does not validate the compression pointer offset values with respect to the actual data present in a DNS response packet, causing a vulnerability.
It is recommended to update to picoTCP and picoTCP-NG versions above 1.7.0 to fix CVE-2020-24339.
The CWE ID for CVE-2020-24339 is CWE-125.