Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2020-17438: SUSE Linux Security Advisory

Back to Search

SUSE: CVE-2020-17438: SUSE Linux Security Advisory

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
12/11/2020
Created
03/04/2021
Added
03/02/2021
Modified
10/22/2021

Description

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures.

Solution(s)

  • suse-upgrade-iscsiuio
  • suse-upgrade-libopeniscsiusr0_2_0
  • suse-upgrade-open-iscsi
  • suse-upgrade-open-iscsi-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;