22 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

05 Sep 2021 — In Contiki 3.0, Telnet option negotiation is mishandled. During negotiation between a server and a client, the server may fail to give the WILL/WONT or DO/DONT response for DO and WILL commands because of improper handling of exception condition, which leads to property violations and denial of service. Specifically, a server sometimes sends no response, because a fixed buffer space is available for all responses and that space may have been exhausted. En Contiki versión 3.0, la negociación de opciones de T... • https://github.com/contiki-os/contiki/issues/2686 • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

10 Aug 2021 — In Contiki 3.0, a buffer overflow in the Telnet service allows remote attackers to cause a denial of service because the ls command is mishandled when a directory has many files with long names. En Contiki versión 3.0, un desbordamiento de búfer en el servicio Telnet permite a atacantes remotos causar una denegación de servicio porque el comando ls es manejado inapropiadamente cuando un directorio presenta muchos archivos con nombres largos • https://github.com/contiki-os/contiki/issues/2687 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

10 Aug 2021 — In Contiki 3.0, a Telnet server that silently quits (before disconnection with clients) leads to connected clients entering an infinite loop and waiting forever, which may cause excessive CPU consumption. En Contiki versión 3.0, un servidor Telnet que se cierra silenciosamente (antes de la desconexión con los clientes) conlleva a que clientes conectados entren en un bucle infinito y esperen eternamente, lo que puede causar un consumo excesivo de la CPU • https://github.com/contiki-os/contiki/issues/2688 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

09 Aug 2021 — In Contiki 3.0, potential nonterminating acknowledgment loops exist in the Telnet service. When the negotiated options are already disabled, servers still respond to DONT and WONT requests with WONT or DONT commands, which may lead to infinite acknowledgment loops, denial of service, and excessive CPU consumption. En Contiki versión 3.0, se presentan posibles bucles de acuse de recibo no terminados en el servicio Telnet. Cuando las opciones negociadas están deshabilitadas, los servidores siguen respondiendo... • https://github.com/contiki-os/contiki/issues/2685 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

24 Mar 2021 — An issue was discovered in Contiki through 3.0. When sending an ICMPv6 error message because of invalid extension header options in an incoming IPv6 packet, there is an attempt to remove the RPL extension headers. Because the packet length and the extension header length are unchecked (with respect to the available data) at this stage, and these variables are susceptible to integer underflow, it is possible to construct an invalid extension header that will cause memory corruption issues and lead to a Denia... • https://github.com/contiki-os/contiki/releases • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

02 Feb 2021 — An issue was discovered in uIP through 1.0, as used in Contiki and Contiki-NG. Domain name parsing lacks bounds checks, allowing an attacker to corrupt memory with crafted DNS packets. Se detectó un problema en uIP versiones hasta 1.0, como es usado en Contiki y Contiki-NG. El análisis de nombres de dominio carece de controles de límites, permitiendo a un atacante corromper la memoria con paquetes DNS diseñados • https://github.com/adamdunkels/uip • CWE-125: Out-of-bounds Read •

CVSS: 9.8EPSS: 16%CPEs: 1EXPL: 0

11 Dec 2020 — An issue was discovered in the IPv6 stack in Contiki through 3.0. There are inconsistent checks for IPv6 header extension lengths. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet. Se detectó un problema en la pila IPv6 en Contiki versiones hasta 3.0. Existen comprobaciones inconsistentes para las longitudes de extensión del encabezado IPv6. • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 11%CPEs: 1EXPL: 0

11 Dec 2020 — An issue was discovered in the IPv6 stack in Contiki through 3.0. There is an insufficient check for the IPv6 header length. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet. Se detectó un problema en la pila de IPv6 en Contiki versiones hasta 3.0. Hay una verificación insuficiente para la longitud del encabezado IPv6. • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

11 Dec 2020 — An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled. Se detectó un problema en Contiki versiones hasta 3.0 y Contiki-NG versiones hasta 4.5. • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 8.2EPSS: 0%CPEs: 3EXPL: 0

11 Dec 2020 — The code that processes DNS responses in uIP through 1.0, as used in Contiki and Contiki-NG, does not check whether the number of responses specified in the DNS packet header corresponds to the response data available in the DNS packet, leading to an out-of-bounds read and Denial-of-Service in resolv.c. El código que procesa las respuestas DNS en uIP versiones hasta 1.0, como es usado en Contiki y Contiki-NG, no verifica si el número de respuestas especificadas en el encabezado del paquete DNS corresponde a... • https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01 • CWE-125: Out-of-bounds Read •