CVE-2023-23609
contiki-ng BLE-L2CAP contains Improper size validation of L2CAP frames
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. Versions prior to and including 4.8 are vulnerable to an out-of-bounds write that can occur in the BLE-L2CAP module. The Bluetooth Low Energy - Logical Link Control and Adaptation Layer Protocol (BLE-L2CAP) module handles fragmentation of packets up the configured MTU size. When fragments are reassembled, they are stored in a packet buffer of a configurable size, but there is no check to verify that the packet buffer is large enough to hold the reassembled packet. In Contiki-NG's default configuration, it is possible that an out-of-bounds write of up to 1152 bytes occurs. The vulnerability has been patched in the "develop" branch of Contiki-NG, and will be included in release 4.9. The problem can be fixed by applying the patch in Contiki-NG pull request #2254 prior to the release of version 4.9.
Contiki-NG es un sistema operativo multiplataforma de código abierto para dispositivos IoT de próxima generación. Las versiones anteriores a la 4.8 incluida son vulnerables a una escritura fuera de los límites que puede ocurrir en el módulo BLE-L2CAP. El módulo Bluetooth de baja energía: protocolo de capa de adaptación y control de enlace lógico (BLE-L2CAP) maneja la fragmentación de paquetes hasta el tamaño de MTU configurado. Cuando se vuelven a ensamblar los fragmentos, se almacenan en un búfer de paquetes de un tamaño configurable, pero no se verifica que el búfer de paquetes sea lo suficientemente grande para contener el paquete reensamblado. En la configuración predeterminada de Contiki-NG, es posible que se produzca una escritura fuera de los límites de hasta 1152 bytes. La vulnerabilidad ha sido parcheada en la rama "desarrollo" de Contiki-NG y se incluirá en la versión 4.9. El problema se puede solucionar aplicando el parche en la solicitud de extracción #2254 de Contiki-NG antes del lanzamiento de la versión 4.9.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-01-16 CVE Reserved
- 2023-01-25 CVE Published
- 2024-07-07 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/contiki-ng/contiki-ng/pull/2254 | 2023-02-07 | |
https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-qr4q-6h3m-h3g7 | 2023-02-07 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Contiki-ng Search vendor "Contiki-ng" | Contiki-ng Search vendor "Contiki-ng" for product "Contiki-ng" | <= 4.8 Search vendor "Contiki-ng" for product "Contiki-ng" and version " <= 4.8" | - |
Affected
|