Vulnerabilities (CVE)

Filtered by vendor Altran Subscribe
Filtered by product Picotcp
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-24338 1 Altran 1 Picotcp 2020-12-14 7.5 HIGH 9.8 CRITICAL
An issue was discovered in picoTCP through 1.7.0. The DNS domain name record decompression functionality in pico_dns_decompress_name() in pico_dns_common.c does not validate the compression pointer offset values with respect to the actual data present in a DNS response packet, causing out-of-bounds writes that lead to Denial-of-Service and Remote Code Execution.
CVE-2020-24341 1 Altran 2 Picotcp, Picotcp-ng 2020-12-14 6.4 MEDIUM 9.1 CRITICAL
An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. The TCP input data processing function in pico_tcp.c does not validate the length of incoming TCP packets, which leads to an out-of-bounds read when assembling received packets into a data segment, eventually causing Denial-of-Service or an information leak.
CVE-2020-17441 2 Altran, Microchip 2 Picotcp, Mplab Harmony 2020-12-14 6.4 MEDIUM 9.1 CRITICAL
An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 headers does not validate whether the IPv6 payload length field is equal to the actual size of the payload, which leads to an Out-of-Bounds read during the ICMPv6 checksum calculation, resulting in either Denial-of-Service or Information Disclosure. This affects pico_ipv6_extension_headers and pico_checksum_adder (in pico_ipv6.c and pico_frame.c).
CVE-2017-1000210 1 Altran 1 Picotcp 2017-11-29 7.5 HIGH 9.8 CRITICAL
picoTCP (versions 1.7.0 - 1.5.0) is vulnerable to stack buffer overflow resulting in code execution or denial of service attack