NULL Pointer Dereference Affecting contiki-ng/contiki-ng package, versions [,4.9)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.4% (74th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about NULL Pointer Dereference vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-CONTIKINGCONTIKING-6137909
  • published22 Dec 2023
  • disclosed11 May 2023
  • creditScepticz, SWW13, Diff-fusion

Introduced: 11 May 2023

CVE-2023-31129  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

Upgrade contiki-ng/contiki-ng to version 4.9 or higher.

Overview

Affected versions of this package are vulnerable to NULL Pointer Dereference in the message handling code for IPv6 router solicitations. Contiki-NG contains an implementation of IPv6 Neighbor Discovery (ND) in the module os/net/ipv6/uip-nd6.c. The ND protocol includes a message type called Router Solicitation (RS), which is used to locate routers and update their address information via the SLLAO (Source Link-Layer Address Option). If the indicated source address changes, a given neighbor entry is set to the STALE state. The message handler does not check for RS messages with an SLLAO that indicates a link-layer address change that a neighbor entry can actually be created for the indicated address.

CVSS Scores

version 3.1