Page 2 of 13 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

11 Dec 2020 — An issue was discovered in picoTCP 1.7.0. The code for parsing the hop-by-hop IPv6 extension headers does not validate the bounds of the extension header length value, which may result in Integer Wraparound. Therefore, a crafted extension header length value may cause Denial-of-Service because it affects the loop in which the extension headers are parsed in pico_ipv6_process_hopbyhop() in pico_ipv6.c. Se detectó un problema en picoTCP versión 1.7.0. El código para analizar los encabezados de extensión ... • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 • CWE-190: Integer Overflow or Wraparound •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

11 Dec 2020 — An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 headers does not validate whether the IPv6 payload length field is equal to the actual size of the payload, which leads to an Out-of-Bounds read during the ICMPv6 checksum calculation, resulting in either Denial-of-Service or Information Disclosure. This affects pico_ipv6_extension_headers and pico_checksum_adder (in pico_ipv6.c and pico_frame.c). Se detectó un problema en picoTCP versión 1.7.0. El código para procesar los encab... • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 • CWE-125: Out-of-bounds Read •

CVSS: 9.8EPSS: 0%CPEs: 6EXPL: 0

17 Nov 2017 — picoTCP (versions 1.7.0 - 1.5.0) is vulnerable to stack buffer overflow resulting in code execution or denial of service attack picoTCP (versiones 1.7.0-1.5.0) es vulnerable a desbordamiento de búfer basado en pila, lo que resulta en un ataque de ejecución de código o de denegación de servicio (DoS). • https://github.com/tass-belgium/picotcp/pull/473 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •