CVE-2020-17438

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-17438
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-17438.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-17438
Related
Published
2020-12-11T23:15:12Z
Modified
2025-01-14T08:35:33.622032Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures.

References

Affected packages

Git / github.com/adamdunkels/uip

Affected ranges

Type
GIT
Repo
https://github.com/adamdunkels/uip
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other

uip-0-5
uip-0-6
uip-0-9
uip-1-0