An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 headers does not validate whether the IPv6 payload length field is equal to the actual size of the payload, which leads to an Out-of-Bounds read during the ICMPv6 checksum calculation, resulting in either Denial-of-Service or Information Disclosure. This affects pico_ipv6_extension_headers and pico_checksum_adder (in pico_ipv6.c and pico_frame.c).
Advisories
Source ID Title
EUVD EUVD EUVD-2020-9394 An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 headers does not validate whether the IPv6 payload length field is equal to the actual size of the payload, which leads to an Out-of-Bounds read during the ICMPv6 checksum calculation, resulting in either Denial-of-Service or Information Disclosure. This affects pico_ipv6_extension_headers and pico_checksum_adder (in pico_ipv6.c and pico_frame.c).
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T13:53:17.412Z

Reserved: 2020-08-07T00:00:00

Link: CVE-2020-17441

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-12-11T23:15:13.213

Modified: 2024-11-21T05:08:07.200

Link: CVE-2020-17441

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.