An issue was discovered in Contiki-NG through 4.3 and Contiki through 3.0. A buffer overflow is present due to an integer underflow during 6LoWPAN fragment processing in the face of truncated fragments in os/net/ipv6/sicslowpan.c. This results in accesses of unmapped memory, crashing the application. An attacker can cause a denial-of-service via a crafted 6LoWPAN frame.
References
Link | Resource |
---|---|
https://github.com/contiki-ng/contiki-ng/pull/972 | Patch Third Party Advisory |
https://github.com/contiki-ng/contiki-ng/releases/tag/release%2Fv4.4 | Release Notes Third Party Advisory |
https://www.usenix.org/system/files/sec20summer_clements_prepub.pdf | Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2020-04-23 15:15
Updated : 2024-02-28 17:47
NVD link : CVE-2019-9183
Mitre link : CVE-2019-9183
CVE.ORG link : CVE-2019-9183
JSON object : View
Products Affected
contiki-os
- contiki
contiki-ng
- contiki-ng