Логотип exploitDog
bind:CVE-2020-17438
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-17438

Количество 7

Количество 7

ubuntu логотип

CVE-2020-17438

около 5 лет назад

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2020-17438

около 5 лет назад

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-wp96-g7r8-wxf4

больше 3 лет назад

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures.

EPSS: Низкий
fstec логотип

BDU:2021-01235

около 5 лет назад

Уязвимость функции uip_reass() (uip.c) операционной системы Contiki OS, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1164-1

почти 5 лет назад

Security update for open-iscsi

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0663-1

почти 5 лет назад

Security update for open-iscsi

EPSS: Низкий
suse-cvrf логотип

SUSE-RU-2021:1517-1

почти 5 лет назад

Recommended update for open-iscsi

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-17438

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures.

CVSS3: 9.8
1%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-17438

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures.

CVSS3: 9.8
1%
Низкий
около 5 лет назад
github логотип
GHSA-wp96-g7r8-wxf4

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures.

1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-01235

Уязвимость функции uip_reass() (uip.c) операционной системы Contiki OS, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS3: 9.8
1%
Низкий
около 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:1164-1

Security update for open-iscsi

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0663-1

Security update for open-iscsi

почти 5 лет назад
suse-cvrf логотип
SUSE-RU-2021:1517-1

Recommended update for open-iscsi

почти 5 лет назад

Уязвимостей на страницу