CVE-2020-24336
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled.
Se detectó un problema en Contiki versiones hasta 3.0 y Contiki-NG versiones hasta 4.5. El código para analizar las respuestas de nombre de dominio Tipo A en el archivo ip64-dns64.c no verifica si la dirección en la longitud de la respuesta es sana. Por lo tanto, cuando se copia una dirección de una longitud arbitraria, puede producirse un desbordamiento de búfer. Este error puede ser explotado siempre que NAT64 esté habilitado
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-08-13 CVE Reserved
- 2020-12-11 CVE Published
- 2023-08-27 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 | Third Party Advisory | |
https://www.kb.cert.org/vuls/id/815128 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Contiki-ng Search vendor "Contiki-ng" | Contiki-ng Search vendor "Contiki-ng" for product "Contiki-ng" | <= 4.5 Search vendor "Contiki-ng" for product "Contiki-ng" and version " <= 4.5" | - |
Affected
| ||||||
Contiki-os Search vendor "Contiki-os" | Contiki Search vendor "Contiki-os" for product "Contiki" | <= 3.0 Search vendor "Contiki-os" for product "Contiki" and version " <= 3.0" | - |
Affected
|