8.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
6.4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:N/A:P
0.002 Low
EPSS
Percentile
52.9%
An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other
products. When the Urgent flag is set in a TCP packet, and the stack is
configured to ignore the urgent data, the stack attempts to use the value
of the Urgent pointer bytes to separate the Urgent data from the normal
data, by calculating the offset at which the normal data should be present
in the global buffer. However, the length of this offset is not checked;
therefore, for large values of the Urgent pointer bytes, the data pointer
can point to memory that is way beyond the data buffer in uip_process in
uip.c.
Author | Note |
---|---|
sbeattie | aka FSCT-2020-0018 issue in embedded copy of uIP |
mdeslaur | per upstream โiscsiuio only uses uip for network โservicesโ, such as DHCP, ARP, etc, and not for normal TCP/IP communicationsโ |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | open-iscsi | <ย 2.0.874-5ubuntu2.11+esm1) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 20.04 | noarch | open-iscsi | <ย 2.0.874-7.1ubuntu6.4 | UNKNOWN |
ubuntu | 21.04 | noarch | open-iscsi | <ย 2.1.3-1ubuntu1 | UNKNOWN |
ubuntu | 21.10 | noarch | open-iscsi | <ย 2.1.3-1ubuntu1 | UNKNOWN |
ubuntu | 22.04 | noarch | open-iscsi | <ย 2.1.3-1ubuntu1 | UNKNOWN |
ubuntu | 22.10 | noarch | open-iscsi | <ย 2.1.3-1ubuntu1 | UNKNOWN |
ubuntu | 23.04 | noarch | open-iscsi | <ย 2.1.3-1ubuntu1 | UNKNOWN |
ubuntu | 16.04 | noarch | open-iscsi | <ย 2.0.873+git0.3b4b4500-14ubuntu3.7+esm1) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
github.com/open-iscsi/open-iscsi/security/advisories/GHSA-r278-fm99-8rgp
launchpad.net/bugs/cve/CVE-2020-17437
nvd.nist.gov/vuln/detail/CVE-2020-17437
security-tracker.debian.org/tracker/CVE-2020-17437
ubuntu.com/security/notices/USN-6259-1
www.cve.org/CVERecord?id=CVE-2020-17437
www.forescout.com/company/resources/amnesia33-how-tcp-ip-stacks-breed-critical-vulnerabilities-in-iot-ot-and-it-devices/
8.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
6.4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:N/A:P
0.002 Low
EPSS
Percentile
52.9%