CVE-2019-9183

An issue was discovered in Contiki-NG through 4.3 and Contiki through 3.0. A buffer overflow is present due to an integer underflow during 6LoWPAN fragment processing in the face of truncated fragments in os/net/ipv6/sicslowpan.c. This results in accesses of unmapped memory, crashing the application. An attacker can cause a denial-of-service via a crafted 6LoWPAN frame.
References
Link Resource
https://github.com/contiki-ng/contiki-ng/releases/tag/release%2Fv4.4 Release Notes Third Party Advisory
https://github.com/contiki-ng/contiki-ng/pull/972 Patch Third Party Advisory
https://www.usenix.org/system/files/sec20summer_clements_prepub.pdf Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*
cpe:2.3:o:contiki-os:contiki:*:*:*:*:*:*:*:*

Information

Published : 2020-04-23 15:15

Updated : 2021-07-21 11:39


NVD link : CVE-2019-9183

Mitre link : CVE-2019-9183


JSON object : View

Products Affected

contiki-ng

  • contiki-ng

contiki-os

  • contiki
CWE
CWE-190

Integer Overflow or Wraparound