CVE-2020-24335

An issue was discovered in uIP through 1.0, as used in Contiki and Contiki-NG. Domain name parsing lacks bounds checks, allowing an attacker to corrupt memory with crafted DNS packets.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 Third Party Advisory US Government Resource
https://github.com/contiki-ng/contiki-ng Product Third Party Advisory
https://github.com/adamdunkels/uip Product Third Party Advisory
https://github.com/contiki-os/contiki Product Third Party Advisory
https://www.kb.cert.org/vuls/id/815128 Third Party Advisory US Government Resource
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:uip_project:uip:*:*:*:*:*:*:*:*
OR cpe:2.3:o:contiki-ng:contiki-ng:-:*:*:*:*:*:*:*
cpe:2.3:o:contiki-os:contiki:-:*:*:*:*:*:*:*

Information

Published : 2021-02-01 23:15

Updated : 2021-02-04 13:24


NVD link : CVE-2020-24335

Mitre link : CVE-2020-24335


JSON object : View

CWE
CWE-125

Out-of-bounds Read

Advertisement

dedicated server usa

Products Affected

contiki-ng

  • contiki-ng

uip_project

  • uip

contiki-os

  • contiki