Filtered by vendor Contiki-ng
Subscribe
Total
49 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-9183 | 2 Contiki-ng, Contiki-os | 2 Contiki-ng, Contiki | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered in Contiki-NG through 4.3 and Contiki through 3.0. A buffer overflow is present due to an integer underflow during 6LoWPAN fragment processing in the face of truncated fragments in os/net/ipv6/sicslowpan.c. This results in accesses of unmapped memory, crashing the application. An attacker can cause a denial-of-service via a crafted 6LoWPAN frame. | |||||
CVE-2019-8359 | 2 Contiki-ng, Contiki-os | 2 Contiki-ng, Contiki | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in Contiki-NG through 4.3 and Contiki through 3.0. An out of bounds write is present in the data section during 6LoWPAN fragment re-assembly in the face of forged fragment offsets in os/net/ipv6/sicslowpan.c. | |||||
CVE-2018-19417 | 1 Contiki-ng | 1 Contiki-ng | 2024-11-21 | 10.0 HIGH | 10.0 CRITICAL |
An issue was discovered in the MQTT server in Contiki-NG before 4.2. The function parse_publish_vhdr() that parses MQTT PUBLISH messages with a variable length header uses memcpy to input data into a fixed size buffer. The allocated buffer can fit only MQTT_MAX_TOPIC_LENGTH (default 64) bytes, and a length check is missing. This could lead to Remote Code Execution via a stack-smashing attack (overwriting the function return address). Contiki-NG does not separate the MQTT server from other servers and the OS modules, so access to all memory regions is possible. | |||||
CVE-2018-16667 | 1 Contiki-ng | 1 Contiki-ng. | 2024-11-21 | 4.4 MEDIUM | 7.0 HIGH |
An issue was discovered in Contiki-NG through 4.1. There is a buffer over-read in lookup in os/storage/antelope/lvm.c while parsing AQL (lvm_register_variable, lvm_set_variable_value, create_intersection, create_union). | |||||
CVE-2018-16666 | 1 Contiki-ng | 1 Contiki-ng. | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
An issue was discovered in Contiki-NG through 4.1. There is a stack-based buffer overflow in next_string in os/storage/antelope/aql-lexer.c while parsing AQL (parsing next string). | |||||
CVE-2018-16665 | 1 Contiki-ng | 1 Contiki-ng. | 2024-11-21 | 3.6 LOW | 6.1 MEDIUM |
An issue was discovered in Contiki-NG through 4.1. There is a buffer overflow while parsing AQL in lvm_shift_for_operator in os/storage/antelope/lvm.c. | |||||
CVE-2018-16664 | 1 Contiki-ng | 1 Contiki-ng. | 2024-11-21 | 4.4 MEDIUM | 7.0 HIGH |
An issue was discovered in Contiki-NG through 4.1. There is a buffer overflow in lvm_set_type in os/storage/antelope/lvm.c while parsing AQL (lvm_set_op, lvm_set_relation, lvm_set_operand). | |||||
CVE-2018-16663 | 1 Contiki-ng | 1 Contiki-ng. | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
An issue was discovered in Contiki-NG through 4.1. There is a stack-based buffer overflow in parse_relations in os/storage/antelope/aql-parser.c while parsing AQL (storage of relations). | |||||
CVE-2018-1000804 | 1 Contiki-ng | 1 Contiki-ng | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
contiki-ng version 4 contains a Buffer Overflow vulnerability in AQL (Antelope Query Language) database engine that can result in Attacker can perform Remote Code Execution on device using Contiki-NG operating system. This attack appear to be exploitable via Attacker must be able to run malicious AQL code (e.g. via SQL-like Injection attack). |