Altran picoTCP through 1.7.0 allows memory corruption (and subsequent denial of service) because of an integer overflow in pico_ipv6_alloc when processing large ICMPv6 packets. This affects installations with Ethernet support in which a packet size greater than 65495 may occur.
References
Link | Resource |
---|---|
https://georgyg.com/home/picotcp-denial-of-service-cve-2023-30463/ | Exploit Third Party Advisory |
https://github.com/tass-belgium/picotcp/releases | Release Notes |
https://georgyg.com/home/picotcp-denial-of-service-cve-2023-30463/ | Exploit Third Party Advisory |
https://github.com/tass-belgium/picotcp/releases | Release Notes |
Configurations
History
21 Nov 2024, 08:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://georgyg.com/home/picotcp-denial-of-service-cve-2023-30463/ - Exploit, Third Party Advisory | |
References | () https://github.com/tass-belgium/picotcp/releases - Release Notes |
Information
Published : 2023-04-19 12:15
Updated : 2024-11-21 08:00
NVD link : CVE-2023-30463
Mitre link : CVE-2023-30463
CVE.ORG link : CVE-2023-30463
JSON object : View
Products Affected
altran
- picotcp
CWE
CWE-190
Integer Overflow or Wraparound