An issue was discovered in Contiki-NG through 4.3 and Contiki through 3.0. A buffer overflow is present due to an integer underflow during 6LoWPAN fragment processing in the face of truncated fragments in os/net/ipv6/sicslowpan.c. This results in accesses of unmapped memory, crashing the application. An attacker can cause a denial-of-service via a crafted 6LoWPAN frame.
References
Link | Resource |
---|---|
https://github.com/contiki-ng/contiki-ng/pull/972 | Patch Third Party Advisory |
https://github.com/contiki-ng/contiki-ng/releases/tag/release%2Fv4.4 | Release Notes Third Party Advisory |
https://www.usenix.org/system/files/sec20summer_clements_prepub.pdf | Technical Description Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-04-23T12:33:37
Updated: 2020-04-24T23:08:49
Reserved: 2019-02-26T00:00:00
Link: CVE-2019-9183
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-04-23T15:15:13.950
Modified: 2021-07-21T11:39:23.747
Link: CVE-2019-9183
JSON object: View
Redhat Information
No data.