CVE-2018-12889

An issue was discovered in CCN-lite 2.0.1. There is a heap-based buffer overflow in mkAddToRelayCacheRequest and in ccnl_populate_cache for an array lacking '\0' termination when reading a binary CCNx or NDN file. This can result in Heap Corruption. This was addressed by fixing the memory management in mkAddToRelayCacheRequest in ccn-lite-ctrl.c.
References
Link Resource
https://github.com/cn-uofbasel/ccn-lite/issues/279 Exploit Third Party Advisory
https://github.com/cn-uofbasel/ccn-lite/issues/279 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:ccn-lite:ccn-lite:2.0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 03:46

Type Values Removed Values Added
References () https://github.com/cn-uofbasel/ccn-lite/issues/279 - Exploit, Third Party Advisory () https://github.com/cn-uofbasel/ccn-lite/issues/279 - Exploit, Third Party Advisory

Information

Published : 2018-06-26 13:29

Updated : 2024-11-21 03:46


NVD link : CVE-2018-12889

Mitre link : CVE-2018-12889

CVE.ORG link : CVE-2018-12889


JSON object : View

Products Affected

ccn-lite

  • ccn-lite
CWE
CWE-787

Out-of-bounds Write