7.5
CVSSv3

CVE-2020-24337

Published: 11/12/2020 Updated: 14/12/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An issue exists in picoTCP and picoTCP-NG up to and including 1.7.0. When an unsupported TCP option with zero length is provided in an incoming TCP packet, it is possible to cause a Denial-of-Service by achieving an infinite loop in the code that parses TCP options, aka tcp_parse_options() in pico_tcp.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

altran picotcp

altran picotcp-ng

Github Repositories

SNF - Simple Network Fuzzer

SNF Simple Network Fuzzer is a very simple TCP and IP options fuzzer A typical TCP packet consists of a 20 bytes header In some cases, TCP options are added, increasing the header length by 32-bit words to a maximum of 40 bytes of options Thus, the TCP header size grows to a total of 60 bytes There are various possible options with a predefined structure: wwwia