You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The TCP input data processing function does not validate the length of incoming TCP packets, allowing attackers to read out of bounds and perform memory corruption.
Root cause
An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. The TCP input data processing function in pico_tcp.c does not validate the length of incoming TCP packets, which leads to an out-of-bounds read when assembling received packets into a data segment, eventually causing Denial-of-Service or an information leak.
Description
Root cause
Software
Name
picoTCP, picoTCP-NG
Versions affected
≤ 1.7.0
Links
The text was updated successfully, but these errors were encountered: