CVE-2020-17440
https://notcve.org/view.php?id=CVE-2020-17440
An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that parses incoming DNS packets does not validate that domain names present in the DNS responses have '\0' termination. This results in errors when calculating the offset of the pointer that jumps over domain name bytes in DNS response packets when a name lacks this termination, and eventually leads to dereferencing the pointer at an invalid/arbitrary address, within newdata() and parse_name() in resolv.c. Se detectó un problema en uIP versión 1.0, como es usado en Contiki versión 3.0 y otros productos. El código que analiza los paquetes DNS entrantes no comprueba a los nombres de dominio presentes en las respuestas DNS tener terminación "\0". • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 https://www.kb.cert.org/vuls/id/815128 •
CVE-2020-17439
https://notcve.org/view.php?id=CVE-2020-17439
An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that parses incoming DNS packets does not validate that the incoming DNS replies match outgoing DNS queries in newdata() in resolv.c. Also, arbitrary DNS replies are parsed if there was any outgoing DNS query with a transaction ID that matches the transaction ID of an incoming reply. Provided that the default DNS cache is quite small (only four records) and that the transaction ID has a very limited set of values that is quite easy to guess, this can lead to DNS cache poisoning. Se detectó un problema en uIP versión 1.0, como es usado en Contiki versión 3.0 y otros productos. • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 https://www.kb.cert.org/vuls/id/815128 • CWE-20: Improper Input Validation •
CVE-2020-17438
https://notcve.org/view.php?id=CVE-2020-17438
An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures. Se detectó un problema en uIP versión 1.0, como es usado en Contiki versión 3.0 y otros productos. El código que reensambla los paquetes fragmentados no comprueba correctamente la longitud total de un paquete entrante especificado en su encabezado IP, así como el valor de compensación de fragmentación especificado en el encabezado IP. • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 https://www.kb.cert.org/vuls/id/815128 • CWE-787: Out-of-bounds Write •
CVE-2020-17437
https://notcve.org/view.php?id=CVE-2020-17437
An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. When the Urgent flag is set in a TCP packet, and the stack is configured to ignore the urgent data, the stack attempts to use the value of the Urgent pointer bytes to separate the Urgent data from the normal data, by calculating the offset at which the normal data should be present in the global buffer. However, the length of this offset is not checked; therefore, for large values of the Urgent pointer bytes, the data pointer can point to memory that is way beyond the data buffer in uip_process in uip.c. Se detectó un problema en uIP versión 1.0, como es usado en Contiki versión 3.0 y otros productos. Cuando el flag Urgent es ajustado en un paquete TCP, y la pila está configurada para ignorar los datos urgentes, la pila intenta usar el valor de los bytes del puntero Urgent para separar los datos Urgent de los datos normales, al calcular el desplazamiento en el que los datos normales deben estar presentes en el búfer global. • https://cert-portal.siemens.com/productcert/pdf/ssa-541018.pdf https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 https://www.kb.cert.org/vuls/id/815128 • CWE-787: Out-of-bounds Write •
CVE-2020-13987
https://notcve.org/view.php?id=CVE-2020-13987
An issue was discovered in Contiki through 3.0. An Out-of-Bounds Read vulnerability exists in the uIP TCP/IP Stack component when calculating the checksums for IP packets in upper_layer_chksum in net/ipv4/uip.c. Se detectó un problema en Contiki versiones hasta 3.0. Se presenta una vulnerabilidad de Lectura Fuera de Límites en el componente uIP TCP/IP Stack cuando se calculan las sumas de comprobación para paquetes IP en la función upper_layer_chksum en el archivo net/ipv4/uip.c • https://cert-portal.siemens.com/productcert/pdf/ssa-541018.pdf https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 https://www.kb.cert.org/vuls/id/815128 • CWE-125: Out-of-bounds Read •