CVE-2024-38373

CRITICAL

FreeRTOS-Plus-TCP <4.1.0 - Buffer Overflow

Title source: llm
STIX 2.1

Description

FreeRTOS-Plus-TCP is a lightweight TCP/IP stack for FreeRTOS. FreeRTOS-Plus-TCP versions 4.0.0 through 4.1.0 contain a buffer over-read issue in the DNS Response Parser when parsing domain names in a DNS response. A carefully crafted DNS response with domain name length value greater than the actual domain name length, could cause the parser to read beyond the DNS response buffer. This issue affects applications using DNS functionality of the FreeRTOS-Plus-TCP stack. Applications that do not use DNS functionality are not affected, even when the DNS functionality is enabled. This vulnerability has been patched in version 4.1.1.

Scores

CVSS v3 9.6
EPSS 0.0065
EPSS Percentile 70.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-125 CWE-126
Status published
Products (1)
amazon/freertos-plus-tcp 4.0.0 - 4.1.1
Published Jun 24, 2024
Tracked Since Feb 18, 2026