A double-free vulnerability exists in the IP header loopback parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted set of network packets can lead to memory corruption, potentially resulting in code execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.
History

Wed, 12 Feb 2025 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Weston-embedded
Weston-embedded uc-tcp-ip
CPEs cpe:2.3:a:weston-embedded:uc-tcp-ip:3.06.01:*:*:*:*:*:*:*
Vendors & Products Weston-embedded
Weston-embedded uc-tcp-ip

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-08-21T14:08:48.788Z

Reserved: 2023-08-03T21:04:53.424Z

Link: CVE-2023-38562

cve-icon Vulnrichment

Updated: 2024-08-02T17:46:55.845Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-20T15:15:08.020

Modified: 2025-02-12T18:51:08.283

Link: CVE-2023-38562

cve-icon Redhat

No data.