A double-free vulnerability exists in the IP header loopback parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted set of network packets can lead to memory corruption, potentially resulting in code execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829 | Exploit Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829 | Exploit Third Party Advisory |
Configurations
History
12 Feb 2025, 18:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829 - Exploit, Third Party Advisory | |
First Time |
Weston-embedded
Weston-embedded uc-tcp-ip |
|
CPE | cpe:2.3:a:weston-embedded:uc-tcp-ip:3.06.01:*:*:*:*:*:*:* |
Information
Published : 2024-02-20 15:15
Updated : 2025-02-12 18:51
NVD link : CVE-2023-38562
Mitre link : CVE-2023-38562
CVE.ORG link : CVE-2023-38562
JSON object : View
Products Affected
weston-embedded
- uc-tcp-ip
CWE
CWE-415
Double Free