Lucene search

K
cve[email protected]CVE-2023-34101
HistoryJun 14, 2023 - 3:15 p.m.

CVE-2023-34101

2023-06-1415:15:10
CWE-125
web.nvd.nist.gov
13
contiki-ng
operating system
iot
cve-2023-34101
security vulnerability
icmp
patch
nvd

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

9.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.9%

Contiki-NG is an operating system for internet of things devices. In version 4.8 and prior, when processing ICMP DAO packets in the dao_input_storing function, the Contiki-NG OS does not verify that the packet buffer is big enough to contain the bytes it needs before accessing them. Up to 16 bytes can be read out of bounds in the dao_input_storing function. An attacker can truncate an ICMP packet so that it does not contain enough data, leading to an out-of-bounds read on these lines. The problem has been patched in the “develop” branch of Contiki-NG, and is expected to be included in release 4.9. As a workaround, one can apply the changes in Contiki-NG pull request #2435 to patch the system.

Affected configurations

Vulners
NVD
Node
contiki-ngcontiki-ng.Range4.8
VendorProductVersionCPE
contiki\-ngcontiki\-ng\.*cpe:2.3:o:contiki\-ng:contiki\-ng\.:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "contiki-ng",
    "product": "contiki-ng",
    "versions": [
      {
        "version": "<= 4.8",
        "status": "affected"
      }
    ]
  }
]

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

9.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.9%

Related for CVE-2023-34101