CVE-2020-17441

An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 headers does not validate whether the IPv6 payload length field is equal to the actual size of the payload, which leads to an Out-of-Bounds read during the ICMPv6 checksum calculation, resulting in either Denial-of-Service or Information Disclosure. This affects pico_ipv6_extension_headers and pico_checksum_adder (in pico_ipv6.c and pico_frame.c).
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 Third Party Advisory US Government Resource
https://www.kb.cert.org/vuls/id/815128 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:altran:picotcp:*:*:*:*:*:*:*:*
cpe:2.3:a:microchip:mplab_harmony:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-12-11 23:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-17441

Mitre link : CVE-2020-17441

CVE.ORG link : CVE-2020-17441


JSON object : View

Products Affected

altran

  • picotcp

microchip

  • mplab_harmony
CWE
CWE-125

Out-of-bounds Read