An issue was discovered in CCN-lite 2.0.1. There is a heap-based buffer overflow in mkAddToRelayCacheRequest and in ccnl_populate_cache for an array lacking '\0' termination when reading a binary CCNx or NDN file. This can result in Heap Corruption. This was addressed by fixing the memory management in mkAddToRelayCacheRequest in ccn-lite-ctrl.c.
References
Link | Resource |
---|---|
https://github.com/cn-uofbasel/ccn-lite/issues/279 | Exploit Third Party Advisory |
https://github.com/cn-uofbasel/ccn-lite/issues/279 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/cn-uofbasel/ccn-lite/issues/279 - Exploit, Third Party Advisory |
Information
Published : 2018-06-26 13:29
Updated : 2024-11-21 03:46
NVD link : CVE-2018-12889
Mitre link : CVE-2018-12889
CVE.ORG link : CVE-2018-12889
JSON object : View
Products Affected
ccn-lite
- ccn-lite
CWE
CWE-787
Out-of-bounds Write