7.5
CVSSv3

CVE-2020-17445

Published: 11/12/2020 Updated: 14/12/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An issue exists in picoTCP 1.7.0. The code for processing the IPv6 destination options does not check for a valid length of the destination options header. This results in an Out-of-Bounds Read, and, depending on the memory protection mechanism, this may result in Denial-of-Service in pico_ipv6_process_destopt() in pico_ipv6.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

altran picotcp

Github Repositories

Toolchains for writing eBPF code and using it as a general programming language

Introduction This repository contains the toolchians of RapidPatch -------------\ | - CppVerifier, The cpp version eBPF verifier | - FiedPatchInstument, A tool for instrumenting the RTOS source code to add the fixed patch points | - PatchGenerator, A tool for compiling eBPF source code | - PatchPresence, A tool for checking if target firmware have the same