Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2020-24340: AMNESIA:33 #56

Open
senier opened this issue Dec 23, 2020 · 0 comments
Open

CVE-2020-24340: AMNESIA:33 #56

senier opened this issue Dec 23, 2020 · 0 comments

Comments

@senier
Copy link
Member

senier commented Dec 23, 2020

Description

The code that processes DNS responses does not check whether the number of responses specified in the DNS packet header correspond to the response data available in the DNS packet, allowing attackers to perform memory corruption.

Root cause

An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. The code that processes DNS responses in pico_mdns_handle_data_as_answers_generic() in pico_mdns.c does not check whether the number of answers/responses specified in a DNS packet header corresponds to the response data available in the packet, leading to an out-of-bounds read, invalid pointer dereference, and Denial-of-Service.

Software

Name

picoTCP, picoTCP-NG

Versions affected

≤ 1.7.0

Links

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant