// For flags

CVE-2020-17440

 

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that parses incoming DNS packets does not validate that domain names present in the DNS responses have '\0' termination. This results in errors when calculating the offset of the pointer that jumps over domain name bytes in DNS response packets when a name lacks this termination, and eventually leads to dereferencing the pointer at an invalid/arbitrary address, within newdata() and parse_name() in resolv.c.

Se detectó un problema en uIP versión 1.0, como es usado en Contiki versión 3.0 y otros productos. El código que analiza los paquetes DNS entrantes no comprueba a los nombres de dominio presentes en las respuestas DNS tener terminación "\0". Esto resulta en errores al calcular el desplazamiento del puntero que salta sobre los bytes del nombre de dominio en los paquetes de respuesta de DNS cuando un nombre carece de esta terminación, y eventualmente conlleva a una desreferencia del puntero a una dirección no válida y arbitraria, dentro de las funciones newdata() y parse_name() en el archivo resolv.c

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-08-07 CVE Reserved
  • 2020-12-11 CVE Published
  • 2023-08-27 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (2)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Uip Project
Search vendor "Uip Project"
Uip
Search vendor "Uip Project" for product "Uip"
1.0
Search vendor "Uip Project" for product "Uip" and version "1.0"
-
Affected
in Contiki-os
Search vendor "Contiki-os"
Contiki
Search vendor "Contiki-os" for product "Contiki"
3.0
Search vendor "Contiki-os" for product "Contiki" and version "3.0"
-
Safe