Contiki-NG is an open-source, cross-platform operating system for IoT devices. In affected versions it is possible to cause a buffer overflow when copying an IPv6 address prefix in the RPL-Classic implementation in Contiki-NG. In order to trigger the vulnerability, the Contiki-NG system must have joined an RPL DODAG. After that, an attacker can send a DAO packet with a Target option that contains a prefix length larger than 128 bits. The problem was fixed after the release of Contiki-NG 4.7. Users unable to upgrade may apply the patch in Contiki-NG PR #1615.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-08-04T20:25:16
Updated: 2024-08-03T23:33:55.883Z
Reserved: 2021-05-12T00:00:00
Link: CVE-2021-32771
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-08-04T21:15:07.907
Modified: 2024-11-21T06:07:42.533
Link: CVE-2021-32771
Redhat
No data.