CVE-2021-32771
Buffer overflow in contiki-ng
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Contiki-NG is an open-source, cross-platform operating system for IoT devices. In affected versions it is possible to cause a buffer overflow when copying an IPv6 address prefix in the RPL-Classic implementation in Contiki-NG. In order to trigger the vulnerability, the Contiki-NG system must have joined an RPL DODAG. After that, an attacker can send a DAO packet with a Target option that contains a prefix length larger than 128 bits. The problem was fixed after the release of Contiki-NG 4.7. Users unable to upgrade may apply the patch in Contiki-NG PR #1615.
Contiki-NG es un sistema operativo de código abierto y multiplataforma para dispositivos IoT. En las versiones afectadas es posible causar un desbordamiento de búfer cuando es copiado un prefijo de dirección IPv6 en la implementación RPL-Classic en Contiki-NG. Para desencadenar la vulnerabilidad, el sistema Contiki-NG debe haberse unido a un DODAG RPL. Después, un atacante puede enviar un paquete DAO con una opción Target que contenga una longitud de prefijo superior a 128 bits. El problema ha sido solucionado tras el lanzamiento de Contiki-NG versión 4.7. Los usuarios que no puedan actualizar pueden aplicar el parche en Contiki-NG PR #1615
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-05-12 CVE Reserved
- 2022-08-04 CVE Published
- 2024-03-25 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://github.com/contiki-ng/contiki-ng/releases/tag/release%2Fv4.8 | Third Party Advisory | |
https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-jqjf-v7v9-xp6w | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/contiki-ng/contiki-ng/pull/1615 | 2022-08-10 | |
https://github.com/contiki-ng/contiki-ng/pull/1615/commits/587ae59956e00316fd44fd7072ac3a6a07b4b20f | 2022-08-10 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Contiki-ng Search vendor "Contiki-ng" | Contiki-ng Search vendor "Contiki-ng" for product "Contiki-ng" | < 4.8 Search vendor "Contiki-ng" for product "Contiki-ng" and version " < 4.8" | - |
Affected
|