// For flags

CVE-2020-17437

 

Severity Score

8.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. When the Urgent flag is set in a TCP packet, and the stack is configured to ignore the urgent data, the stack attempts to use the value of the Urgent pointer bytes to separate the Urgent data from the normal data, by calculating the offset at which the normal data should be present in the global buffer. However, the length of this offset is not checked; therefore, for large values of the Urgent pointer bytes, the data pointer can point to memory that is way beyond the data buffer in uip_process in uip.c.

Se detectó un problema en uIP versión 1.0, como es usado en Contiki versión 3.0 y otros productos. Cuando el flag Urgent es ajustado en un paquete TCP, y la pila está configurada para ignorar los datos urgentes, la pila intenta usar el valor de los bytes del puntero Urgent para separar los datos Urgent de los datos normales, al calcular el desplazamiento en el que los datos normales deben estar presentes en el búfer global. Sin embargo, no se comprueba la longitud de este desplazamiento; por lo tanto, para valores grandes de bytes de puntero Urgent, el puntero de datos puede apuntar a la memoria que está mucho más allá del búfer de datos en la función uip_process en el archivo uip.c

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-08-07 CVE Reserved
  • 2020-12-11 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-10-15 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Uip Project
Search vendor "Uip Project"
Uip
Search vendor "Uip Project" for product "Uip"
<= 1.0
Search vendor "Uip Project" for product "Uip" and version " <= 1.0"
-
Affected
in Contiki-os
Search vendor "Contiki-os"
Contiki
Search vendor "Contiki-os" for product "Contiki"
<= 3.0
Search vendor "Contiki-os" for product "Contiki" and version " <= 3.0"
-
Safe
Siemens
Search vendor "Siemens"
Sentron 3va Com100 Firmware
Search vendor "Siemens" for product "Sentron 3va Com100 Firmware"
< 4.4.1
Search vendor "Siemens" for product "Sentron 3va Com100 Firmware" and version " < 4.4.1"
-
Affected
in Siemens
Search vendor "Siemens"
Sentron 3va Com100
Search vendor "Siemens" for product "Sentron 3va Com100"
--
Safe
Siemens
Search vendor "Siemens"
Sentron 3va Com800 Firmware
Search vendor "Siemens" for product "Sentron 3va Com800 Firmware"
< 4.4.1
Search vendor "Siemens" for product "Sentron 3va Com800 Firmware" and version " < 4.4.1"
-
Affected
in Siemens
Search vendor "Siemens"
Sentron 3va Com800
Search vendor "Siemens" for product "Sentron 3va Com800"
--
Safe
Siemens
Search vendor "Siemens"
Sentron 3va Dsp800 Firmware
Search vendor "Siemens" for product "Sentron 3va Dsp800 Firmware"
< 4.0
Search vendor "Siemens" for product "Sentron 3va Dsp800 Firmware" and version " < 4.0"
-
Affected
in Siemens
Search vendor "Siemens"
Sentron 3va Dsp800
Search vendor "Siemens" for product "Sentron 3va Dsp800"
--
Safe
Siemens
Search vendor "Siemens"
Sentron Pac2200 Clp Firmware
Search vendor "Siemens" for product "Sentron Pac2200 Clp Firmware"
--
Affected
in Siemens
Search vendor "Siemens"
Sentron Pac2200 Clp
Search vendor "Siemens" for product "Sentron Pac2200 Clp"
--
Safe
Siemens
Search vendor "Siemens"
Sentron Pac2200 Firmware
Search vendor "Siemens" for product "Sentron Pac2200 Firmware"
< 3.2.2
Search vendor "Siemens" for product "Sentron Pac2200 Firmware" and version " < 3.2.2"
-
Affected
in Siemens
Search vendor "Siemens"
Sentron Pac2200
Search vendor "Siemens" for product "Sentron Pac2200"
--
Safe
Siemens
Search vendor "Siemens"
Sentron Pac3200 Firmware
Search vendor "Siemens" for product "Sentron Pac3200 Firmware"
< 2.4.7
Search vendor "Siemens" for product "Sentron Pac3200 Firmware" and version " < 2.4.7"
-
Affected
in Siemens
Search vendor "Siemens"
Sentron Pac3200
Search vendor "Siemens" for product "Sentron Pac3200"
--
Safe
Siemens
Search vendor "Siemens"
Sentron Pac3200t Firmware
Search vendor "Siemens" for product "Sentron Pac3200t Firmware"
< 3.2.2
Search vendor "Siemens" for product "Sentron Pac3200t Firmware" and version " < 3.2.2"
-
Affected
in Siemens
Search vendor "Siemens"
Sentron Pac3200t
Search vendor "Siemens" for product "Sentron Pac3200t"
--
Safe
Siemens
Search vendor "Siemens"
Sentron Pac3220 Firmware
Search vendor "Siemens" for product "Sentron Pac3220 Firmware"
< 3.2.0
Search vendor "Siemens" for product "Sentron Pac3220 Firmware" and version " < 3.2.0"
-
Affected
in Siemens
Search vendor "Siemens"
Sentron Pac3220
Search vendor "Siemens" for product "Sentron Pac3220"
--
Safe
Siemens
Search vendor "Siemens"
Sentron Pac4200 Firmware
Search vendor "Siemens" for product "Sentron Pac4200 Firmware"
< 2.3.0
Search vendor "Siemens" for product "Sentron Pac4200 Firmware" and version " < 2.3.0"
-
Affected
in Siemens
Search vendor "Siemens"
Sentron Pac4200
Search vendor "Siemens" for product "Sentron Pac4200"
--
Safe
Open-iscsi Project
Search vendor "Open-iscsi Project"
Open-iscsi
Search vendor "Open-iscsi Project" for product "Open-iscsi"
<= 2.1.7
Search vendor "Open-iscsi Project" for product "Open-iscsi" and version " <= 2.1.7"
-
Affected