An issue was discovered in Contiki-NG through 4.3 and Contiki through 3.0. A buffer overflow is present due to an integer underflow during 6LoWPAN fragment processing in the face of truncated fragments in os/net/ipv6/sicslowpan.c. This results in accesses of unmapped memory, crashing the application. An attacker can cause a denial-of-service via a crafted 6LoWPAN frame.
References
Link | Resource |
---|---|
https://github.com/contiki-ng/contiki-ng/releases/tag/release%2Fv4.4 | Release Notes Third Party Advisory |
https://github.com/contiki-ng/contiki-ng/pull/972 | Patch Third Party Advisory |
https://www.usenix.org/system/files/sec20summer_clements_prepub.pdf | Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-04-23 08:15
Updated : 2021-07-21 04:39
NVD link : CVE-2019-9183
Mitre link : CVE-2019-9183
JSON object : View
Products Affected
contiki-ng
- contiki-ng
contiki-os
- contiki