Vulnerability Description
An issue was discovered in picoTCP through 1.7.0. The DNS domain name record decompression functionality in pico_dns_decompress_name() in pico_dns_common.c does not validate the compression pointer offset values with respect to the actual data present in a DNS response packet, causing out-of-bounds writes that lead to Denial-of-Service and Remote Code Execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Altran | Picotcp | <= 1.7.0 |
Related Weaknesses (CWE)
References
- https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01Third Party AdvisoryUS Government Resource
- https://www.kb.cert.org/vuls/id/815128Third Party AdvisoryUS Government Resource
- https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01Third Party AdvisoryUS Government Resource
- https://www.kb.cert.org/vuls/id/815128Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2020-24338?
CVE-2020-24338 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered in picoTCP through 1.7.0. The DNS domain name record decompression functionality in pico_dns_decompress_name() in pico_dns_common.c does not validate the compression pointer of...
How severe is CVE-2020-24338?
CVE-2020-24338 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-24338?
Check the references section above for vendor advisories and patch information. Affected products include: Altran Picotcp.