Page 2 of 13 results (0.015 seconds)

CVSS: 9.8EPSS: 85%CPEs: 1EXPL: 0

An issue was discovered in picoTCP through 1.7.0. The DNS domain name record decompression functionality in pico_dns_decompress_name() in pico_dns_common.c does not validate the compression pointer offset values with respect to the actual data present in a DNS response packet, causing out-of-bounds writes that lead to Denial-of-Service and Remote Code Execution. Se detectó un problema en picoTCP versiones hasta 1.7.0. La funcionalidad de descompresión de registros de nombres de dominio DNS en la función pico_dns_decompress_name() en el archivo pico_dns_common.c no comprueba los valores de desplazamiento del puntero de compresión con respecto a los datos reales presentes en un paquete de respuesta DNS, causando escrituras fuera de límites que conducen a una Denegación de Servicio y una ejecución de código remota • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 https://www.kb.cert.org/vuls/id/815128 • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. When an unsupported TCP option with zero length is provided in an incoming TCP packet, it is possible to cause a Denial-of-Service by achieving an infinite loop in the code that parses TCP options, aka tcp_parse_options() in pico_tcp.c. Se detectó un problema en picoTCP y picoTCP-NG versiones hasta 1.7.0. Cuando se proporciona una opción TCP no compatible con longitud cero en un paquete TCP entrante, es posible causar una Denegación de Servicio logrando un bucle infinito en el código que analiza las opciones TCP, también se conoce como la función tcp_parse_options() en el archivo pico_tcp.c • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 https://www.kb.cert.org/vuls/id/815128 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 destination options does not check for a valid length of the destination options header. This results in an Out-of-Bounds Read, and, depending on the memory protection mechanism, this may result in Denial-of-Service in pico_ipv6_process_destopt() in pico_ipv6.c. Se detectó un problema en picoTCP versión 1.7.0. El código para procesar las opciones de destino de IPv6 no comprueba una longitud válida del encabezado de opciones de destino. • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 https://www.kb.cert.org/vuls/id/815128 • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in picoTCP 1.7.0. The routine for processing the next header field (and deducing whether the IPv6 extension headers are valid) doesn't check whether the header extension length field would overflow. Therefore, if it wraps around to zero, iterating through the extension headers will not increment the current data pointer. This leads to an infinite loop and Denial-of-Service in pico_ipv6_check_headers_sequence() in pico_ipv6.c. Se detectó un problema en picoTCP versión 1.7.0. • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 https://www.kb.cert.org/vuls/id/815128 • CWE-20: Improper Input Validation CWE-190: Integer Overflow or Wraparound CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in picoTCP 1.7.0. The code for creating an ICMPv6 echo replies doesn't check whether the ICMPv6 echo request packet's size is shorter than 8 bytes. If the size of the incoming ICMPv6 request packet is shorter than this, the operation that calculates the size of the ICMPv6 echo replies has an integer wrap around, leading to memory corruption and, eventually, Denial-of-Service in pico_icmp6_send_echoreply_not_frag in pico_icmp6.c. Se detectó un problema en picoTCP versión 1.7.0. El código para crear una respuesta de eco ICMPv6 no comprueba si el tamaño del paquete de peticiones eco ICMPv6 es inferior a 8 bytes. • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 https://www.kb.cert.org/vuls/id/815128 • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •