DNS.Response.Malformed.Domain.Name.Memory.Corruption
Description
This indicates an attack attempt to exploit a Memory Corruption vulnerability in picoTCP, Ethernut, or Contiki.
The vulnerability is due to an error when the vulnerable software handles a maliciously crafted DNS response packet. An attacker can exploit this to cause a Denial-of-Service condition and potential Code Execution via a crafted packet.
Affected Products
picoTCP 1.7.0
Contiki through 3.0 and Contiki-NG through 4.5
Ethernut in Nut/OS 5.1
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://github.com/contiki-os/contiki
https://github.com/tass-belgium/picotcp
http://www.ethernut.de/
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |