An issue was discovered in picoTCP 1.7.0. The code for creating an ICMPv6 echo replies doesn't check whether the ICMPv6 echo request packet's size is shorter than 8 bytes. If the size of the incoming ICMPv6 request packet is shorter than this, the operation that calculates the size of the ICMPv6 echo replies has an integer wrap around, leading to memory corruption and, eventually, Denial-of-Service in pico_icmp6_send_echoreply_not_frag in pico_icmp6.c.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 Third Party Advisory US Government Resource
https://www.kb.cert.org/vuls/id/815128 Third Party Advisory US Government Resource
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2020-12-11T22:31:33

Updated: 2020-12-11T22:31:33

Reserved: 2020-08-07T00:00:00


Link: CVE-2020-17443

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-12-11T23:15:13.387

Modified: 2021-07-21T11:39:23.747


Link: CVE-2020-17443

JSON object: View

cve-icon Redhat Information

No data.