CVE-2024-38373

FreeRTOS-Plus-TCP is a lightweight TCP/IP stack for FreeRTOS. FreeRTOS-Plus-TCP versions 4.0.0 through 4.1.0 contain a buffer over-read issue in the DNS Response Parser when parsing domain names in a DNS response. A carefully crafted DNS response with domain name length value greater than the actual domain name length, could cause the parser to read beyond the DNS response buffer. This issue affects applications using DNS functionality of the FreeRTOS-Plus-TCP stack. Applications that do not use DNS functionality are not affected, even when the DNS functionality is enabled. This vulnerability has been patched in version 4.1.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:amazon:freertos-plus-tcp:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:25

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.1
v2 : unknown
v3 : 9.6
References () https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/releases/tag/V4.1.1 - Release Notes () https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/releases/tag/V4.1.1 - Release Notes
References () https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/security/advisories/GHSA-ppcp-rg65-58mv - Vendor Advisory () https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/security/advisories/GHSA-ppcp-rg65-58mv - Vendor Advisory

26 Jun 2024, 15:02

Type Values Removed Values Added
References () https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/releases/tag/V4.1.1 - () https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/releases/tag/V4.1.1 - Release Notes
References () https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/security/advisories/GHSA-ppcp-rg65-58mv - () https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/security/advisories/GHSA-ppcp-rg65-58mv - Vendor Advisory
CWE CWE-125
Summary
  • (es) FreeRTOS-Plus-TCP es una pila TCP/IP ligera para FreeRTOS. Las versiones 4.0.0 a 4.1.0 de FreeRTOS-Plus-TCP contienen un problema de sobrelectura del búfer en el analizador de respuesta DNS al analizar nombres de dominio en una respuesta DNS. Una respuesta DNS cuidadosamente manipulada con un valor de longitud del nombre de dominio mayor que la longitud real del nombre de dominio podría hacer que el analizador lea más allá del búfer de respuesta DNS. Este problema afecta a las aplicaciones que utilizan la funcionalidad DNS de la pila FreeRTOS-Plus-TCP. Las aplicaciones que no utilizan la funcionalidad DNS no se ven afectadas, incluso cuando la funcionalidad DNS está habilitada. Esta vulnerabilidad ha sido parcheada en la versión 4.1.1.
First Time Amazon freertos-plus-tcp
Amazon
CPE cpe:2.3:a:amazon:freertos-plus-tcp:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 9.6
v2 : unknown
v3 : 8.1

24 Jun 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-24 17:15

Updated : 2024-11-21 09:25


NVD link : CVE-2024-38373

Mitre link : CVE-2024-38373

CVE.ORG link : CVE-2024-38373


JSON object : View

Products Affected

amazon

  • freertos-plus-tcp
CWE
CWE-126

Buffer Over-read

CWE-125

Out-of-bounds Read