First published: Fri Dec 11 2020(Updated: )
An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. The TCP input data processing function in pico_tcp.c does not validate the length of incoming TCP packets, which leads to an out-of-bounds read when assembling received packets into a data segment, eventually causing Denial-of-Service or an information leak.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Altran picoTCP | <=1.7.0 | |
Altran Picotcp-ng | <=1.7.0 | |
Multiple (open source) picoTCP-NG, Version 1.7.0 and prior | ||
Multiple (open source) picoTCP (EOL), Version 1.7.0 and prior | ||
Multiple (open source) FNET, Version 4.6.3 | ||
Multiple (open source) Nut/Net, Version 5.1 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24341 is a vulnerability in picoTCP and picoTCP-NG through 1.7.0 that allows for an out-of-bounds read and can lead to Denial-of-Service (DoS) attacks.
The severity of CVE-2020-24341 is critical with a CVSS score of 9.1.
Versions up to and including 1.7.0 of Altran picoTCP and Altran Picotcp-ng are affected by CVE-2020-24341.
CVE-2020-24341 can be exploited by sending specially crafted TCP packets to the vulnerable system.
Yes, a fix is available for CVE-2020-24341. It is recommended to update to a patched version of picoTCP or picoTCP-NG.