DNS.Response.Malformed.Domain.Name.Memory.Corruption

description-logoDescription

This indicates an attack attempt to exploit a Memory Corruption vulnerability in picoTCP, Ethernut, or Contiki.
The vulnerability is due to an error when the vulnerable software handles a maliciously crafted DNS response packet. An attacker can exploit this to cause a Denial-of-Service condition and potential Code Execution via a crafted packet.

affected-products-logoAffected Products

picoTCP 1.7.0
Contiki through 3.0 and Contiki-NG through 4.5
Ethernut in Nut/OS 5.1

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://github.com/contiki-os/contiki
https://github.com/tass-belgium/picotcp
http://www.ethernut.de/

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2021-03-02 17.025 Default_action:pass:drop
2021-02-18 17.019