Stack-based buffer overflow in the ipv6_addr_from_str function in sys/net/network_layer/ipv6/addr/ipv6_addr_from_str.c in RIOT prior to 2017-04-25 allows local attackers, and potentially remote attackers, to cause a denial of service or possibly have unspecified other impact via a malformed IPv6 address.
References
Link | Resource |
---|---|
https://github.com/RIOT-OS/RIOT/issues/6840 | Issue Tracking Patch Third Party Advisory |
https://github.com/RIOT-OS/RIOT/pull/6961 | Issue Tracking Patch Third Party Advisory |
https://github.com/RIOT-OS/RIOT/pull/6962 | Issue Tracking Patch |
Configurations
History
No history.
Information
Published : 2017-04-27 01:59
Updated : 2024-02-28 15:44
NVD link : CVE-2017-8289
Mitre link : CVE-2017-8289
CVE.ORG link : CVE-2017-8289
JSON object : View
Products Affected
riot_project
- riot
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer