
CVE-2020-17445
https://notcve.org/view.php?id=CVE-2020-17445
11 Dec 2020 — An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 destination options does not check for a valid length of the destination options header. This results in an Out-of-Bounds Read, and, depending on the memory protection mechanism, this may result in Denial-of-Service in pico_ipv6_process_destopt() in pico_ipv6.c. Se detectó un problema en picoTCP versión 1.7.0. El código para procesar las opciones de destino de IPv6 no comprueba una longitud válida del encabezado de opciones de d... • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 • CWE-125: Out-of-bounds Read •

CVE-2020-17444
https://notcve.org/view.php?id=CVE-2020-17444
11 Dec 2020 — An issue was discovered in picoTCP 1.7.0. The routine for processing the next header field (and deducing whether the IPv6 extension headers are valid) doesn't check whether the header extension length field would overflow. Therefore, if it wraps around to zero, iterating through the extension headers will not increment the current data pointer. This leads to an infinite loop and Denial-of-Service in pico_ipv6_check_headers_sequence() in pico_ipv6.c. Se detectó un problema en picoTCP versión 1.7.0. • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 • CWE-20: Improper Input Validation CWE-190: Integer Overflow or Wraparound CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2020-17443
https://notcve.org/view.php?id=CVE-2020-17443
11 Dec 2020 — An issue was discovered in picoTCP 1.7.0. The code for creating an ICMPv6 echo replies doesn't check whether the ICMPv6 echo request packet's size is shorter than 8 bytes. If the size of the incoming ICMPv6 request packet is shorter than this, the operation that calculates the size of the ICMPv6 echo replies has an integer wrap around, leading to memory corruption and, eventually, Denial-of-Service in pico_icmp6_send_echoreply_not_frag in pico_icmp6.c. Se detectó un problema en picoTCP versión 1.7.0. E... • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVE-2020-17442
https://notcve.org/view.php?id=CVE-2020-17442
11 Dec 2020 — An issue was discovered in picoTCP 1.7.0. The code for parsing the hop-by-hop IPv6 extension headers does not validate the bounds of the extension header length value, which may result in Integer Wraparound. Therefore, a crafted extension header length value may cause Denial-of-Service because it affects the loop in which the extension headers are parsed in pico_ipv6_process_hopbyhop() in pico_ipv6.c. Se detectó un problema en picoTCP versión 1.7.0. El código para analizar los encabezados de extensión ... • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 • CWE-190: Integer Overflow or Wraparound •

CVE-2020-17441
https://notcve.org/view.php?id=CVE-2020-17441
11 Dec 2020 — An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 headers does not validate whether the IPv6 payload length field is equal to the actual size of the payload, which leads to an Out-of-Bounds read during the ICMPv6 checksum calculation, resulting in either Denial-of-Service or Information Disclosure. This affects pico_ipv6_extension_headers and pico_checksum_adder (in pico_ipv6.c and pico_frame.c). Se detectó un problema en picoTCP versión 1.7.0. El código para procesar los encab... • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 • CWE-125: Out-of-bounds Read •

CVE-2017-1000210
https://notcve.org/view.php?id=CVE-2017-1000210
17 Nov 2017 — picoTCP (versions 1.7.0 - 1.5.0) is vulnerable to stack buffer overflow resulting in code execution or denial of service attack picoTCP (versiones 1.7.0-1.5.0) es vulnerable a desbordamiento de búfer basado en pila, lo que resulta en un ataque de ejecución de código o de denegación de servicio (DoS). • https://github.com/tass-belgium/picotcp/pull/473 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •