First published: Wed Feb 15 2023(Updated: )
Double Free vulnerability in virtualsquare picoTCP v1.7.0 and picoTCP-NG v2.1 in modules/pico_fragments.c in function pico_fragments_reassemble, allows attackers to execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Altran picoTCP | =1.7.0 | |
Altran Picotcp-ng | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-33304 is critical with a CVSS score of 9.8.
The Double Free vulnerability in virtualsquare picoTCP allows attackers to execute arbitrary code by exploiting a flaw in the pico_fragments_reassemble function in modules/pico_fragments.c.
CVE-2021-33304 affects Altran picoTCP version 1.7.0 and Altran Picotcp-ng version 2.1.
At the time of this writing, there is no specific fix available for CVE-2021-33304. It is recommended to follow the GitHub issue for updates.
You can find more information about CVE-2021-33304 in the GitHub issue: https://github.com/virtualsquare/picotcp/issues/6.