A double-free vulnerability exists in the IP header loopback parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted set of network packets can lead to memory corruption, potentially resulting in code execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829 | Exploit Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829 | Exploit Third Party Advisory |
Configurations
History
12 Feb 2025, 18:51
Type | Values Removed | Values Added |
---|---|---|
First Time |
Weston-embedded uc-tcp-ip
Weston-embedded |
|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:weston-embedded:uc-tcp-ip:3.06.01:*:*:*:*:*:*:* |
21 Nov 2024, 08:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829 - | |
Summary |
|
20 Feb 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Feb 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-20 15:15
Updated : 2025-02-12 18:51
NVD link : CVE-2023-38562
Mitre link : CVE-2023-38562
CVE.ORG link : CVE-2023-38562
JSON object : View
Products Affected
weston-embedded
- uc-tcp-ip
CWE
CWE-415
Double Free