CVE-2020-24334 — Out-of-bounds Read in Project UIP
Severity
8.2HIGHNVD
EPSS
0.6%
top 29.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 11
Latest updateMay 24
Description
The code that processes DNS responses in uIP through 1.0, as used in Contiki and Contiki-NG, does not check whether the number of responses specified in the DNS packet header corresponds to the response data available in the DNS packet, leading to an out-of-bounds read and Denial-of-Service in resolv.c.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:HExploitability: 3.9 | Impact: 4.2
Affected Packages1 packages
🔴Vulnerability Details
1📋Vendor Advisories
1🕵️Threat Intelligence
1Tenable▶
AMNESIA:33: Researchers Disclose 33 Vulnerabilities Across Four Open Source TCP/IP Libraries↗2020-12-09