9.6 CVE-2024-38373
FreeRTOS-Plus-TCP is a lightweight TCP/IP stack for FreeRTOS. FreeRTOS-Plus-TCP versions 4.0.0 through 4.1.0 contain a buffer over-read issue in the DNS Response Parser when parsing domain names in a DNS response. A carefully crafted DNS response with domain name length value greater than the actual domain name length, could cause the parser to read beyond the DNS response buffer. This issue affects applications using DNS functionality of the FreeRTOS-Plus-TCP stack. Applications that do not use DNS functionality are not affected, even when the DNS functionality is enabled. This vulnerability has been patched in version 4.1.1.
https://nvd.nist.gov/vuln/detail/CVE-2024-38373
Categories
CWE-126
CWE-125
References
af854a3a-2127-422b-91ae-364da2661108
https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/releases/tag/V4.1.1 Release Notes |
https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/security/advisories/GHSA-ppcp-r... Vendor Advisory |
security-advisories@github.com
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:amazon:freertos-plus-tcp:*:*:*:*:*:*:*:* | >= 4.0.0 | < 4.1.1 |
REMEDIATION
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
Other Nist (github, ...)
Url |
---|
No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.