Vulnerability Name: | CVE-2020-17440 (CCN-192757) | ||||||||||||
Assigned: | 2020-12-08 | ||||||||||||
Published: | 2020-12-08 | ||||||||||||
Updated: | 2020-12-15 | ||||||||||||
Summary: | An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that parses incoming DNS packets does not validate that domain names present in the DNS responses have '\0' termination. This results in errors when calculating the offset of the pointer that jumps over domain name bytes in DNS response packets when a name lacks this termination, and eventually leads to dereferencing the pointer at an invalid/arbitrary address, within newdata() and parse_name() in resolv.c. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-17440 Source: CCN Type: US-CERT VU#815128 Embedded TCP/IP stacks have memory corruption vulnerabilities Source: XF Type: UNKNOWN tcpipstacks-cve202017440-dos(192757) Source: CCN Type: uip GIT Repository uIP Source: CCN Type: contiki-ng GIT Repository Contiki-NG: The OS for Next Generation IoT Devices Source: CCN Type: contiki GIT Repository The Contiki Operating System Source: CCN Type: ICSA-20-343-01 Multiple Embedded TCP/IP Stacks Source: MISC Type: Third Party Advisory, US Government Resource https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 Source: CCN Type: Forescout Web site AMNESIA:33 Source: MISC Type: Third Party Advisory, US Government Resource https://www.kb.cert.org/vuls/id/815128 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |