Out-of-Bounds Affecting riot-os/riot package, versions [2017.04,2018.10.1)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.47% (76th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-RIOTOSRIOT-2365016
  • published26 Jan 2022
  • disclosed4 Feb 2019
  • creditUnknown

Introduced: 4 Feb 2019

CVE-2019-1000006  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade riot-os/riot to version 2018.10.1 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-Bounds. RIOT RIOT-OS version after commit 7af03ab624db0412c727eed9ab7630a5282e2fd3 contains a Buffer Overflow vulnerability in sock_dns, an implementation of the DNS protocol utilizing the RIOT sock API that can result in Remote code executing. This attack appears to be exploitable via network connectivity.

References

CVSS Scores

version 3.1