CVE-2020-24335

An issue was discovered in uIP through 1.0, as used in Contiki and Contiki-NG. Domain name parsing lacks bounds checks, allowing an attacker to corrupt memory with crafted DNS packets.
References
Link Resource
https://github.com/adamdunkels/uip Product Third Party Advisory
https://github.com/contiki-ng/contiki-ng Product Third Party Advisory
https://github.com/contiki-os/contiki Product Third Party Advisory
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 Third Party Advisory US Government Resource
https://www.kb.cert.org/vuls/id/815128 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:uip_project:uip:*:*:*:*:*:*:*:*
OR cpe:2.3:o:contiki-ng:contiki-ng:-:*:*:*:*:*:*:*
cpe:2.3:o:contiki-os:contiki:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-02-02 07:15

Updated : 2024-02-04 21:23


NVD link : CVE-2020-24335

Mitre link : CVE-2020-24335

CVE.ORG link : CVE-2020-24335


JSON object : View

Products Affected

contiki-ng

  • contiki-ng

contiki-os

  • contiki

uip_project

  • uip
CWE
CWE-125

Out-of-bounds Read