Out-of-bounds Read Affecting contiki-ng/contiki-ng package, versions [,4.7)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.18% (56th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-CONTIKINGCONTIKING-6137939
  • published22 Dec 2023
  • disclosed18 Jun 2021
  • creditUnknown

Introduced: 18 Jun 2021

CVE-2021-21410  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

Upgrade contiki-ng/contiki-ng to version 4.7 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-bounds Read. Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. An out-of-bounds read can be triggered by 6LoWPAN packets sent to devices running Contiki-NG 4.6 and prior. The IPv6 header decompression function (uncompress_hdr_iphc) does not perform proper boundary checks when reading from the packet buffer. Hence, it is possible to construct a compressed 6LoWPAN packet that will read more bytes than what is available from the packet buffer. As of time of publication, there is not a release with a patch available. Users can apply the patch for this vulnerability out-of-band as a workaround.

CVSS Scores

version 3.1