TROYANOSYVIRUS
Back to CVEs

CVE-2020-17438

CRITICAL
9.8

Description

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures.

CVE Details

CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published12/11/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

contiki-os:contikiuip_project:uip

Weaknesses (CWE)

CWE-787

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.