Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2018-16602: FreeRTOS TCP/IP #73

Open
senier opened this issue Jan 29, 2021 · 0 comments
Open

CVE-2018-16602: FreeRTOS TCP/IP #73

senier opened this issue Jan 29, 2021 · 0 comments

Comments

@senier
Copy link
Member

senier commented Jan 29, 2021

Description

The prvProcessDHCPReplies function doesn’t validate that a packet is large enough to be a valid DHCP packet.

Root cause

An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. Out of bounds memory access during parsing of DHCP responses in prvProcessDHCPReplies can be used for information disclosure.

Software

Name

FreeRTOS

Versions affected

1.3.1 - 10.0.1

Links

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant