Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In verions prior to 4.6, an attacker can perform a denial-of-service attack by triggering an infinite loop in the processing of IPv6 neighbor solicitation (NS) messages. This type of attack can effectively shut down the operation of the system because of the cooperative scheduling used for the main parts of Contiki-NG and its communication stack. The problem has been patched in Contiki-NG 4.6. Users can apply the patch for this vulnerability out-of-band as a workaround.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2021-06-18T20:40:10

Updated: 2024-08-03T18:09:15.131Z

Reserved: 2020-12-22T00:00:00

Link: CVE-2021-21279

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2021-06-18T21:15:07.667

Modified: 2021-06-22T19:15:19.500

Link: CVE-2021-21279

cve-icon Redhat

No data.