In the TCP implementation (gnrc_tcp) in RIOT through 2019.07, the parser for TCP options does not terminate on all inputs, allowing a denial-of-service, because sys/net/gnrc/transport_layer/tcp/gnrc_tcp_option.c has an infinite loop for an unknown zero-length option.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/RIOT-OS/RIOT/issues/12086 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T00:56:22.457Z
Reserved: 2019-08-27T00:00:00
Link: CVE-2019-15702

No data.

Status : Modified
Published: 2019-08-27T18:15:11.280
Modified: 2024-11-21T04:29:17.363
Link: CVE-2019-15702

No data.