An issue was discovered in Contiki-NG through 4.3 and Contiki through 3.0. A buffer overflow is present due to an integer underflow during 6LoWPAN fragment processing in the face of truncated fragments in os/net/ipv6/sicslowpan.c. This results in accesses of unmapped memory, crashing the application. An attacker can cause a denial-of-service via a crafted 6LoWPAN frame.
References
Link Resource
https://github.com/contiki-ng/contiki-ng/pull/972 Patch Third Party Advisory
https://github.com/contiki-ng/contiki-ng/releases/tag/release%2Fv4.4 Release Notes Third Party Advisory
https://www.usenix.org/system/files/sec20summer_clements_prepub.pdf Technical Description Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2020-04-23T12:33:37

Updated: 2020-04-24T23:08:49

Reserved: 2019-02-26T00:00:00


Link: CVE-2019-9183

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-04-23T15:15:13.950

Modified: 2021-07-21T11:39:23.747


Link: CVE-2019-9183

JSON object: View

cve-icon Redhat Information

No data.