Contiki-os

Contiki

13 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.33%
  • Published 05.09.2021 19:15:15
  • Last modified 21.11.2024 06:24:18

In Contiki 3.0, Telnet option negotiation is mishandled. During negotiation between a server and a client, the server may fail to give the WILL/WONT or DO/DONT response for DO and WILL commands because of improper handling of exception condition, whi...

  • EPSS 0.6%
  • Published 10.08.2021 19:15:07
  • Last modified 21.11.2024 06:16:57

In Contiki 3.0, a buffer overflow in the Telnet service allows remote attackers to cause a denial of service because the ls command is mishandled when a directory has many files with long names.

  • EPSS 0.33%
  • Published 10.08.2021 19:15:07
  • Last modified 21.11.2024 06:16:58

In Contiki 3.0, a Telnet server that silently quits (before disconnection with clients) leads to connected clients entering an infinite loop and waiting forever, which may cause excessive CPU consumption.

Exploit
  • EPSS 0.28%
  • Published 09.08.2021 22:15:08
  • Last modified 21.11.2024 06:16:46

In Contiki 3.0, potential nonterminating acknowledgment loops exist in the Telnet service. When the negotiated options are already disabled, servers still respond to DONT and WONT requests with WONT or DONT commands, which may lead to infinite acknow...

  • EPSS 0.35%
  • Published 24.03.2021 14:15:14
  • Last modified 21.11.2024 05:59:35

An issue was discovered in Contiki through 3.0. When sending an ICMPv6 error message because of invalid extension header options in an incoming IPv6 packet, there is an attempt to remove the RPL extension headers. Because the packet length and the ex...

  • EPSS 1.83%
  • Published 11.12.2020 23:15:13
  • Last modified 21.11.2024 05:14:36

An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arb...

  • EPSS 0.45%
  • Published 11.12.2020 22:15:12
  • Last modified 21.11.2024 05:02:17

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when processing IPv6 extension headers in ext_hdr_options_process in net/ipv6/uip6.c.

  • EPSS 0.55%
  • Published 11.12.2020 22:15:12
  • Last modified 21.11.2024 05:02:17

An issue was discovered in Contiki through 3.0. A memory corruption vulnerability exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.

  • EPSS 0.32%
  • Published 11.12.2020 22:15:12
  • Last modified 21.11.2024 05:02:17

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.

  • EPSS 0.66%
  • Published 23.04.2020 15:15:13
  • Last modified 21.11.2024 04:49:45

An issue was discovered in Contiki-NG through 4.3 and Contiki through 3.0. An out of bounds write is present in the data section during 6LoWPAN fragment re-assembly in the face of forged fragment offsets in os/net/ipv6/sicslowpan.c.