Contiki-os

Contiki

13 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.33%
  • Veröffentlicht 05.09.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 06:24:18

In Contiki 3.0, Telnet option negotiation is mishandled. During negotiation between a server and a client, the server may fail to give the WILL/WONT or DO/DONT response for DO and WILL commands because of improper handling of exception condition, whi...

  • EPSS 0.6%
  • Veröffentlicht 10.08.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:16:57

In Contiki 3.0, a buffer overflow in the Telnet service allows remote attackers to cause a denial of service because the ls command is mishandled when a directory has many files with long names.

  • EPSS 0.33%
  • Veröffentlicht 10.08.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:16:58

In Contiki 3.0, a Telnet server that silently quits (before disconnection with clients) leads to connected clients entering an infinite loop and waiting forever, which may cause excessive CPU consumption.

Exploit
  • EPSS 0.28%
  • Veröffentlicht 09.08.2021 22:15:08
  • Zuletzt bearbeitet 21.11.2024 06:16:46

In Contiki 3.0, potential nonterminating acknowledgment loops exist in the Telnet service. When the negotiated options are already disabled, servers still respond to DONT and WONT requests with WONT or DONT commands, which may lead to infinite acknow...

  • EPSS 0.35%
  • Veröffentlicht 24.03.2021 14:15:14
  • Zuletzt bearbeitet 21.11.2024 05:59:35

An issue was discovered in Contiki through 3.0. When sending an ICMPv6 error message because of invalid extension header options in an incoming IPv6 packet, there is an attempt to remove the RPL extension headers. Because the packet length and the ex...

  • EPSS 1.83%
  • Veröffentlicht 11.12.2020 23:15:13
  • Zuletzt bearbeitet 21.11.2024 05:14:36

An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arb...

  • EPSS 0.45%
  • Veröffentlicht 11.12.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:02:17

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when processing IPv6 extension headers in ext_hdr_options_process in net/ipv6/uip6.c.

  • EPSS 0.55%
  • Veröffentlicht 11.12.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:02:17

An issue was discovered in Contiki through 3.0. A memory corruption vulnerability exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.

  • EPSS 0.32%
  • Veröffentlicht 11.12.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:02:17

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.

  • EPSS 0.66%
  • Veröffentlicht 23.04.2020 15:15:13
  • Zuletzt bearbeitet 21.11.2024 04:49:45

An issue was discovered in Contiki-NG through 4.3 and Contiki through 3.0. An out of bounds write is present in the data section during 6LoWPAN fragment re-assembly in the face of forged fragment offsets in os/net/ipv6/sicslowpan.c.