Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2020-27633
Disclosure Date: October 10, 2023 (last updated October 14, 2023)
In FNET 4.6.3, TCP ISNs are improperly random.
0
Attacker Value
Unknown
CVE-2020-17470
Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An issue was discovered in FNET through 4.6.4. The code that initializes the DNS client interface structure does not set sufficiently random transaction IDs (they are always set to 1 in _fnet_dns_poll in fnet_dns.c). This significantly simplifies DNS cache poisoning attacks.
0
Attacker Value
Unknown
CVE-2020-17469
Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An issue was discovered in FNET through 4.6.4. The code for IPv6 fragment reassembly tries to access a previous fragment starting from a network incoming fragment that still doesn't have a reference to the previous one (which supposedly resides in the reassembly list). When faced with an incoming fragment that belongs to a non-empty fragment list, IPv6 reassembly must check that there are no empty holes between the fragments: this leads to an uninitialized pointer dereference in _fnet_ip6_reassembly in fnet_ip6.c, and causes Denial-of-Service.
0
Attacker Value
Unknown
CVE-2020-24383
Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An issue was discovered in FNET through 4.6.4. The code for processing resource records in mDNS queries doesn't check for proper '\0' termination of the resource record name string, leading to an out-of-bounds read, and potentially causing information leak or Denial-or-Service.
0
Attacker Value
Unknown
CVE-2020-17467
Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An issue was discovered in FNET through 4.6.4. The code for processing the hostname from an LLMNR request doesn't check for '\0' termination. Therefore, the deduced length of the hostname doesn't reflect the correct length of the actual data. This may lead to Information Disclosure in _fnet_llmnr_poll in fnet_llmnr.c during a response to a malicious request of the DNS class IN.
0
Attacker Value
Unknown
CVE-2020-17468
Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An issue was discovered in FNET through 4.6.4. The code for processing the hop-by-hop header (in the IPv6 extension headers) doesn't check for a valid length of an extension header, and therefore an out-of-bounds read can occur in _fnet_ip6_ext_header_handler_options in fnet_ip6.c, leading to Denial-of-Service.
0