Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In verions prior to 4.6, an attacker can perform a denial-of-service attack by triggering an infinite loop in the processing of IPv6 neighbor solicitation (NS) messages. This type of attack can effectively shut down the operation of the system because of the cooperative scheduling used for the main parts of Contiki-NG and its communication stack. The problem has been patched in Contiki-NG 4.6. Users can apply the patch for this vulnerability out-of-band as a workaround.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2021-06-18T20:40:10
Updated: 2024-08-03T18:09:15.131Z
Reserved: 2020-12-22T00:00:00
Link: CVE-2021-21279
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-06-18T21:15:07.667
Modified: 2024-11-21T05:47:55.227
Link: CVE-2021-21279
Redhat
No data.