Show filters
154 Total Results
Displaying 51-60 of 154
Sort by:
Attacker Value
Unknown

CVE-2021-21410

Disclosure Date: June 18, 2021 (last updated February 22, 2025)
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds read can be triggered by 6LoWPAN packets sent to devices running Contiki-NG 4.6 and prior. The IPv6 header decompression function (<code>uncompress_hdr_iphc</code>) does not perform proper boundary checks when reading from the packet buffer. Hence, it is possible to construct a compressed 6LoWPAN packet that will read more bytes than what is available from the packet buffer. As of time of publication, there is not a release with a patch available. Users can apply the patch for this vulnerability out-of-band as a workaround.
Attacker Value
Unknown

CVE-2021-21282

Disclosure Date: June 18, 2021 (last updated February 22, 2025)
Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In versions prior to 4.5, buffer overflow can be triggered by an input packet when using either of Contiki-NG's two RPL implementations in source-routing mode. The problem has been patched in Contiki-NG 4.5. Users can apply the patch for this vulnerability out-of-band as a workaround.
Attacker Value
Unknown

CVE-2021-28362

Disclosure Date: March 24, 2021 (last updated February 22, 2025)
An issue was discovered in Contiki through 3.0. When sending an ICMPv6 error message because of invalid extension header options in an incoming IPv6 packet, there is an attempt to remove the RPL extension headers. Because the packet length and the extension header length are unchecked (with respect to the available data) at this stage, and these variables are susceptible to integer underflow, it is possible to construct an invalid extension header that will cause memory corruption issues and lead to a Denial-of-Service condition. This is related to rpl-ext-header.c.
Attacker Value
Unknown

CVE-2020-24336

Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled.
Attacker Value
Unknown

CVE-2020-25112

Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An issue was discovered in the IPv6 stack in Contiki through 3.0. There are inconsistent checks for IPv6 header extension lengths. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.
Attacker Value
Unknown

CVE-2020-25111

Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An issue was discovered in the IPv6 stack in Contiki through 3.0. There is an insufficient check for the IPv6 header length. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.
Attacker Value
Unknown

CVE-2020-13988

Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An issue was discovered in Contiki through 3.0. An Integer Overflow exists in the uIP TCP/IP Stack component when parsing TCP MSS options of IPv4 network packets in uip_process in net/ipv4/uip.c.
Attacker Value
Unknown

CVE-2020-13985

Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An issue was discovered in Contiki through 3.0. A memory corruption vulnerability exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.
Attacker Value
Unknown

CVE-2020-13984

Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when processing IPv6 extension headers in ext_hdr_options_process in net/ipv6/uip6.c.
Attacker Value
Unknown

CVE-2020-13986

Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.