CVE-2020-24334Out-of-bounds Read in Project UIP

CWE-125Out-of-bounds Read4 documents4 sources
Severity
8.2HIGHNVD
EPSS
0.6%
top 29.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 11
Latest updateMay 24

Description

The code that processes DNS responses in uIP through 1.0, as used in Contiki and Contiki-NG, does not check whether the number of responses specified in the DNS packet header corresponds to the response data available in the DNS packet, leading to an out-of-bounds read and Denial-of-Service in resolv.c.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:HExploitability: 3.9 | Impact: 4.2

Affected Packages1 packages

🔴Vulnerability Details

1
GHSA
GHSA-38jp-4v3p-cc3q: The code that processes DNS responses in uIP through 12022-05-24

📋Vendor Advisories

1
CISA ICS
Multiple Embedded TCP/IP Stacks2020-12-09

🕵️Threat Intelligence

1
Tenable
AMNESIA:33: Researchers Disclose 33 Vulnerabilities Across Four Open Source TCP/IP Libraries2020-12-09