Описание
An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. When an unsupported TCP option with zero length is provided in an incoming TCP packet, it is possible to cause a Denial-of-Service by achieving an infinite loop in the code that parses TCP options, aka tcp_parse_options() in pico_tcp.c.
Ссылки
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до 1.7.0 (включая)Версия до 1.7.0 (включая)
Одно из
cpe:2.3:a:altran:picotcp:*:*:*:*:*:*:*:*
cpe:2.3:a:altran:picotcp-ng:*:*:*:*:*:*:*:*
EPSS
Процентиль: 63%
0.00447
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-835
Связанные уязвимости
github
больше 3 лет назад
An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. When an unsupported TCP option with zero length is provided in an incoming TCP packet, it is possible to cause a Denial-of-Service by achieving an infinite loop in the code that parses TCP options, aka tcp_parse_options() in pico_tcp.c.
EPSS
Процентиль: 63%
0.00447
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-835