Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2020-13988

Published: 1 December 2020

An issue was discovered in Contiki through 3.0. An Integer Overflow exists in the uIP TCP/IP Stack component when parsing TCP MSS options of IPv4 network packets in uip_process in net/ipv4/uip.c.

Notes

AuthorNote
sbeattie
aka FSCT-2020-0008
issue in embedded copy of uIP
mdeslaur
per upstream "iscsiuio only uses uip for network "services",
such as DHCP, ARP, etc, and not for normal TCP/IP
communications"

Priority

Low

Cvss 3 Severity Score

7.5

Score breakdown

Status

Package Release Status
open-iscsi
Launchpad, Ubuntu, Debian
impish
Released (2.1.3-1ubuntu1)
groovy Ignored
(end of life)
bionic
Released (2.0.874-5ubuntu2.11+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
focal
Released (2.0.874-7.1ubuntu6.4)
trusty Not vulnerable
(code not present)
upstream
Released (2.1.3)
hirsute
Released (2.1.3-1ubuntu1)
xenial
Released (2.0.873+git0.3b4b4500-14ubuntu3.7+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
jammy
Released (2.1.3-1ubuntu1)
lunar
Released (2.1.3-1ubuntu1)
kinetic
Released (2.1.3-1ubuntu1)
Patches:
upstream: https://github.com/open-iscsi/open-iscsi/commit/1f7968efff15eb737eb086a298cc1f0f0e308411

Severity score breakdown

Parameter Value
Base score 7.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H