CVE-2023-38562

A double-free vulnerability exists in the IP header loopback parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted set of network packets can lead to memory corruption, potentially resulting in code execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:weston-embedded:uc-tcp-ip:3.06.01:*:*:*:*:*:*:*

History

12 Feb 2025, 18:51

Type Values Removed Values Added
First Time Weston-embedded uc-tcp-ip
Weston-embedded
References () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829 - () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829 - Exploit, Third Party Advisory
CPE cpe:2.3:a:weston-embedded:uc-tcp-ip:3.06.01:*:*:*:*:*:*:*

21 Nov 2024, 08:13

Type Values Removed Values Added
References () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829 - () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829 -
Summary
  • (es) Existe una vulnerabilidad de doble liberación en la funcionalidad de análisis de bucle invertido del encabezado IP de Weston Embedded uC-TCP-IP v3.06.01. Un conjunto de paquetes de red especialmente manipulado puede provocar daños en la memoria, lo que podría provocar la ejecución de código. Un atacante puede enviar una secuencia de paquetes no autenticados para desencadenar esta vulnerabilidad.

20 Feb 2024, 18:15

Type Values Removed Values Added
References
  • {'url': 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1829', 'source': 'talos-cna@cisco.com'}

20 Feb 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-20 15:15

Updated : 2025-02-12 18:51


NVD link : CVE-2023-38562

Mitre link : CVE-2023-38562

CVE.ORG link : CVE-2023-38562


JSON object : View

Products Affected

weston-embedded

  • uc-tcp-ip
CWE
CWE-415

Double Free