A double-free vulnerability exists in the IP header loopback parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted set of network packets can lead to memory corruption, potentially resulting in code execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.
Metrics
Affected Vendors & Products
References
History
Wed, 12 Feb 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Weston-embedded
Weston-embedded uc-tcp-ip |
|
CPEs | cpe:2.3:a:weston-embedded:uc-tcp-ip:3.06.01:*:*:*:*:*:*:* | |
Vendors & Products |
Weston-embedded
Weston-embedded uc-tcp-ip |

Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-21T14:08:48.788Z
Reserved: 2023-08-03T21:04:53.424Z
Link: CVE-2023-38562

Updated: 2024-08-02T17:46:55.845Z

Status : Analyzed
Published: 2024-02-20T15:15:08.020
Modified: 2025-02-12T18:51:08.283
Link: CVE-2023-38562

No data.