Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown
CVE-2021-42147
Disclosure Date: January 24, 2024 (last updated February 02, 2024)
Buffer over-read vulnerability in the dtls_sha256_update function in Contiki-NG tinyDTLS through master branch 53a0d97 allows remote attackers to cause a denial of service via crafted data packet.
0
Attacker Value
Unknown
CVE-2021-42146
Disclosure Date: January 24, 2024 (last updated February 02, 2024)
An issue was discovered in Contiki-NG tinyDTLS through master branch 53a0d97. DTLS servers allow remote attackers to reuse the same epoch number within two times the TCP maximum segment lifetime, which is prohibited in RFC6347. This vulnerability allows remote attackers to obtain sensitive application (data of connected clients).
0
Attacker Value
Unknown
CVE-2021-42145
Disclosure Date: January 24, 2024 (last updated February 01, 2024)
An assertion failure discovered in in check_certificate_request() in Contiki-NG tinyDTLS through master branch 53a0d97 allows attackers to cause a denial of service.
0
Attacker Value
Unknown
CVE-2021-42144
Disclosure Date: January 24, 2024 (last updated February 01, 2024)
Buffer over-read vulnerability in Contiki-NG tinyDTLS through master branch 53a0d97 allows attackers obtain sensitive information via crafted input to dtls_ccm_decrypt_message().
0
Attacker Value
Unknown
CVE-2021-42143
Disclosure Date: January 24, 2024 (last updated February 01, 2024)
An issue was discovered in Contiki-NG tinyDTLS through master branch 53a0d97. An infinite loop bug exists during the handling of a ClientHello handshake message. This bug allows remote attackers to cause a denial of service by sending a malformed ClientHello handshake message with an odd length of cipher suites, which triggers an infinite loop (consuming all resources) and a buffer over-read that can disclose sensitive information.
0
Attacker Value
Unknown
CVE-2021-42142
Disclosure Date: January 23, 2024 (last updated February 01, 2024)
An issue was discovered in Contiki-NG tinyDTLS through master branch 53a0d97. DTLS servers mishandle the early use of a large epoch number. This vulnerability allows remote attackers to cause a denial of service and false-positive packet drops.
0
Attacker Value
Unknown
CVE-2021-42141
Disclosure Date: January 22, 2024 (last updated January 31, 2024)
An issue was discovered in Contiki-NG tinyDTLS through 2018-08-30. One incorrect handshake could complete with different epoch numbers in the packets Client_Hello, Client_key_exchange, and Change_cipher_spec, which may cause denial of service.
0
Attacker Value
Unknown
CVE-2021-34430
Disclosure Date: July 08, 2021 (last updated February 23, 2025)
Eclipse TinyDTLS through 0.9-rc1 relies on the rand function in the C library, which makes it easier for remote attackers to compute the master key and then decrypt DTLS traffic.
0
Attacker Value
Unknown
CVE-2017-7243
Disclosure Date: March 24, 2017 (last updated November 26, 2024)
Eclipse tinydtls 0.8.2 for Eclipse IoT allows remote attackers to cause a denial of service (DTLS peer crash) by sending a "Change cipher spec" packet without pre-handshake.
0