Out-of-bounds Write Affecting contiki-ng/contiki-ng package, versions [4.4,4.6)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.2% (58th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-CONTIKINGCONTIKING-6137938
  • published22 Dec 2023
  • disclosed18 Aug 2020
  • creditUnknown

Introduced: 18 Aug 2020

CVE-2020-14936  (opens in a new tab)
CWE-787  (opens in a new tab)

How to fix?

Upgrade contiki-ng/contiki-ng to version 4.6 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-bounds Write. Buffer overflows were discovered in Contiki-NG 4.4 through 4.5, in the SNMP agent. Functions parsing the OIDs in SNMP requests lack sufficient allocated target-buffer capacity verification when writing parsed OID values. The function snmp_oid_decode_oid() may overwrite memory areas beyond the provided target buffer, when called from snmp_message_decode() upon an SNMP request reception. Because the content of the write operations is externally provided in the SNMP requests, it enables a remote overwrite of an IoT device's memory regions beyond the allocated buffer. This overflow may allow remote overwrite of stack and statically allocated variables memory regions by sending a crafted SNMP request.

CVSS Scores

version 3.1