Integer Overflow or Wraparound Affecting contiki-ng/contiki-ng package, versions [,4.4)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.2% (58th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-CONTIKINGCONTIKING-6137925
  • published22 Dec 2023
  • disclosed23 Apr 2020
  • creditUnknown

Introduced: 23 Apr 2020

CVE-2019-9183  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade contiki-ng/contiki-ng to version 4.4 or higher.

Overview

Affected versions of this package are vulnerable to Integer Overflow or Wraparound. An issue was discovered in Contiki-NG through 4.3 and Contiki through 3.0. A buffer overflow is present due to an integer underflow during 6LoWPAN fragment processing in the face of truncated fragments in os/net/ipv6/sicslowpan.c. This results in accesses of unmapped memory, crashing the application. An attacker can cause a denial-of-service via a crafted 6LoWPAN frame.

CVSS Scores

version 3.1