RIOT is an operating system for internet of things (IoT) devices. In version 2024.04 and prior, the function `_parse_advertise`, located in `/sys/net/application_layer/dhcpv6/client.c`, has no minimum header length check for `dhcpv6_opt_t` after processing `dhcpv6_msg_t`. This omission could lead to an out-of-bound read, causing system inconsistency. Additionally, the same lack of a header length check is present in the function `_preparse_advertise`, which is called by `_parse_advertise` before handling the request. As of time of publication, no known patched version exists.
History

Mon, 25 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Riot-os
Riot-os riot
CPEs cpe:2.3:o:riot-os:riot:*:*:*:*:*:*:*:*
Vendors & Products Riot-os
Riot-os riot
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 Nov 2024 16:00:00 +0000

Type Values Removed Values Added
Description RIOT is an operating system for internet of things (IoT) devices. In version 2024.04 and prior, the function `_parse_advertise`, located in `/sys/net/application_layer/dhcpv6/client.c`, has no minimum header length check for `dhcpv6_opt_t` after processing `dhcpv6_msg_t`. This omission could lead to an out-of-bound read, causing system inconsistency. Additionally, the same lack of a header length check is present in the function `_preparse_advertise`, which is called by `_parse_advertise` before handling the request. As of time of publication, no known patched version exists.
Title RIOT-OS missing dhcpv6_opt_t minimum header length check
Weaknesses CWE-125
CWE-20
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-11-22T15:41:29.609Z

Updated: 2024-11-25T18:07:14.616Z

Reserved: 2024-11-15T17:11:13.441Z

Link: CVE-2024-52802

cve-icon Vulnrichment

Updated: 2024-11-25T18:07:09.625Z

cve-icon NVD

Status : Received

Published: 2024-11-22T16:15:34.283

Modified: 2024-11-22T16:15:34.283

Link: CVE-2024-52802

cve-icon Redhat

No data.