Stack-based buffer overflow in the ipv6_addr_from_str function in sys/net/network_layer/ipv6/addr/ipv6_addr_from_str.c in RIOT prior to 2017-04-25 allows local attackers, and potentially remote attackers, to cause a denial of service or possibly have unspecified other impact via a malformed IPv6 address.
References
Link | Resource |
---|---|
https://github.com/RIOT-OS/RIOT/pull/6962 | Issue Tracking Patch |
https://github.com/RIOT-OS/RIOT/pull/6961 | Issue Tracking Patch Third Party Advisory |
https://github.com/RIOT-OS/RIOT/issues/6840 | Issue Tracking Patch Third Party Advisory |
Configurations
Information
Published : 2017-04-26 18:59
Updated : 2017-05-10 10:34
NVD link : CVE-2017-8289
Mitre link : CVE-2017-8289
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
riot_project
- riot