contiki-ng contiki-ng 跨界内存读

admin 2023-12-01 14:01:30 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
contiki-ng contiki-ng 跨界内存读

CVE编号

CVE-2021-21410

利用情况

暂无

补丁情况

N/A

披露时间

2021-06-19
漏洞描述
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds read can be triggered by 6LoWPAN packets sent to devices running Contiki-NG 4.6 and prior. The IPv6 header decompression function (<code>uncompress_hdr_iphc</code>) does not perform proper boundary checks when reading from the packet buffer. Hence, it is possible to construct a compressed 6LoWPAN packet that will read more bytes than what is available from the packet buffer. As of time of publication, there is not a release with a patch available. Users can apply the patch for this vulnerability out-of-band as a workaround.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/contiki-ng/contiki-ng/pull/1482
https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-hhwj-2p59-v8p9
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 contiki-ng contiki-ng * Up to (including) 4.6
CVSS3评分 9.1
  • 攻击路径 网络
  • 攻击复杂度 低
  • 权限要求 无
  • 影响范围 未更改
  • 用户交互 无
  • 可用性 高
  • 保密性 高
  • 完整性 无
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CWE-ID 漏洞类型
CWE-125 跨界内存读
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0