An issue exists in picoTCP and picoTCP-NG up to and including 1.7.0. When an unsupported TCP option with zero length is provided in an incoming TCP packet, it is possible to cause a Denial-of-Service by achieving an infinite loop in the code that parses TCP options, aka tcp_parse_options() in pico_tcp.c.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
altran picotcp |
||
altran picotcp-ng |