First published: Mon Jun 19 2023(Updated: )
VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not properly check whether header sizes would result in accessing data outside of a packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PicoTCP | <=2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35849 has a medium severity level due to its potential to cause data exposure or corruption.
To fix CVE-2023-35849, upgrade to a version of PicoTCP greater than 2.1 that addresses this vulnerability.
CVE-2023-35849 affects PicoTCP versions up to and including 2.1.
CVE-2023-35849 introduces the risk of accessing data outside of a packet due to improper header size checks.
Yes, a patch is available in later versions of PicoTCP that users should apply to mitigate the issue.