CVE-2020-17529

Out-of-bounds Write vulnerability in TCP Stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying and invalid fragmentation offset value specified in the IP header. This is only impacts builds with both CONFIG_EXPERIMENTAL and CONFIG_NET_TCP_REASSEMBLY build flags enabled.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:nuttx:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:nuttx:10.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:08

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2020/12/09/5 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2020/12/09/5 - Mailing List, Third Party Advisory
References () https://lists.apache.org/thread.html/r4d71ae3ab96b589835b94ba7ac4cb88a704e7307bceefeab749366f3%40%3Cdev.nuttx.apache.org%3E - Mailing List, Vendor Advisory () https://lists.apache.org/thread.html/r4d71ae3ab96b589835b94ba7ac4cb88a704e7307bceefeab749366f3%40%3Cdev.nuttx.apache.org%3E - Mailing List, Vendor Advisory

07 Nov 2023, 03:19

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/r4d71ae3ab96b589835b94ba7ac4cb88a704e7307bceefeab749366f3@%3Cdev.nuttx.apache.org%3E', 'name': '[nuttx-dev] 20201209 CVE-2020-17529: Apache NuttX (incubating) Out of Bound Write from invalid fragmentation offset value specified in the IP header', 'tags': ['Mailing List', 'Vendor Advisory'], 'refsource': 'MLIST'}

Information

Published : 2020-12-09 17:15

Updated : 2024-11-21 05:08


NVD link : CVE-2020-17529

Mitre link : CVE-2020-17529

CVE.ORG link : CVE-2020-17529


JSON object : View

Products Affected

apache

  • nuttx
CWE
CWE-787

Out-of-bounds Write