Filters

Multiple (open source) picoTCP-NG, Version 1.7.0 and prior33 vulnerabilities

An issue was discovered in uIP through 1.0, as used in Contiki and Contiki-NG. Domain name parsing l…

7.5
First published (updated )

An issue was discovered in the IPv6 stack in Contiki through 3.0. There are inconsistent checks for …

First published (updated )

An issue was discovered in the IPv6 stack in Contiki through 3.0. There is an insufficient check for…

First published (updated )

An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The length byte of a do…

First published (updated )

An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The number of DNS queri…

First published (updated )

An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The DNS response data l…

First published (updated )

An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. There is no check on wh…

First published (updated )

An issue was discovered in FNET through 4.6.4. The code for processing resource records in mDNS quer…

First published (updated )

An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. The TCP input data processing funct…

First published (updated )

An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. The code that processes DNS respons…

8.2
First published (updated )

An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. The DNS domain name record decompre…

7.5
First published (updated )

An issue was discovered in picoTCP through 1.7.0. The DNS domain name record decompression functiona…

First published (updated )

An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. When an unsupported TCP option with…

7.5
First published (updated )

Buffer Overflow

First published (updated )

The code that processes DNS responses in uIP through 1.0, as used in Contiki and Contiki-NG, does no…

8.2
First published (updated )

Input Validation

First published (updated )

An issue was discovered in FNET through 4.6.4. The code for IPv6 fragment reassembly tries to access…

7.5
First published (updated )

An issue was discovered in FNET through 4.6.4. The code for processing the hop-by-hop header (in the…

7.5
First published (updated )

An issue was discovered in FNET through 4.6.4. The code for processing the hostname from an LLMNR re…

First published (updated )

An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 destination options does …

7.5
First published (updated )

Integer Overflow, Input Validation

7.5
First published (updated )

Integer Overflow

8.2
First published (updated )

Integer Overflow

7.5
First published (updated )

Input Validation

First published (updated )

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that parses …

7.5
First published (updated )

Input Validation

8.3
First published (updated )

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassem…

First published (updated )

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack comp…

7.5
First published (updated )

Integer Overflow

7.5
First published (updated )

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack comp…

7.5
First published (updated )

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. When the Urgent flag …

8.2
First published (updated )

Integer Overflow

7.5
First published (updated )

An issue was discovered in Contiki through 3.0. An Out-of-Bounds Read vulnerability exists in the uI…

8.2
First published (updated )

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203