First published: Fri Dec 11 2020(Updated: )
An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The length byte of a domain name in a DNS query/response is not checked, and is used for internal memory operations. This may lead to successful Denial-of-Service, and possibly Remote Code Execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ethernut nut/os | <=5.1 | |
Contiki OS | ||
Contiki-NG | ||
uIP | ||
SUSE Open-iSCSI | ||
altran picoTCP-NG | ||
picoTCP | ||
butok FNET | ||
Nut/Net |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25110 is classified as a high severity vulnerability due to its potential for Denial-of-Service and possible Remote Code Execution.
To mitigate CVE-2020-25110, update the affected software to a version after 5.1 for Ethernut and ensure other affected open-source products are also updated.
CVE-2020-25110 affects Ethernut Nut/OS 5.1 and prior, as well as various open source software including Contiki OS, uIP, and open-iscsi.
CVE-2020-25110 can lead to successful Denial-of-Service attacks and potentially allow for Remote Code Execution.
CVE-2020-25110 is a remote vulnerability, allowing attackers to exploit it from a distance.