Contiki-ng

Contiki-ng

41 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Published 01.09.2022 12:15:10
  • Last modified 21.11.2024 07:12:16

Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The low-power IPv6 network stack of Contiki-NG has a buffer module (os/net/ipv6/uipbuf.c) that processes IPv6 extension headers in incoming data packets. A...

  • EPSS 0.58%
  • Published 04.08.2022 21:15:08
  • Last modified 21.11.2024 07:11:58

Contiki-NG is an open-source, cross-platform operating system for IoT devices. In the RPL-Classic routing protocol implementation in the Contiki-NG operating system, an incoming DODAG Information Option (DIO) control message can contain a prefix info...

  • EPSS 0.53%
  • Published 04.08.2022 21:15:08
  • Last modified 21.11.2024 07:11:58

Contiki-NG is an open-source, cross-platform operating system for IoT devices. Because of insufficient validation of IPv6 neighbor discovery options in Contiki-NG, attackers can send neighbor solicitation packets that trigger an out-of-bounds read. T...

  • EPSS 0.69%
  • Published 04.08.2022 21:15:07
  • Last modified 21.11.2024 06:07:42

Contiki-NG is an open-source, cross-platform operating system for IoT devices. In affected versions it is possible to cause a buffer overflow when copying an IPv6 address prefix in the RPL-Classic implementation in Contiki-NG. In order to trigger the...

  • EPSS 0.11%
  • Published 07.12.2021 19:15:07
  • Last modified 21.11.2024 04:59:19

A buffer overflow in os/net/mac/ble/ble-l2cap.c in the BLE stack in Contiki-NG 4.4 and earlier allows an attacker to execute arbitrary code via malicious L2CAP frames.

  • EPSS 0.5%
  • Published 19.10.2021 16:15:07
  • Last modified 21.11.2024 04:59:19

An out-of-bounds read in the SNMP stack in Contiki-NG 4.4 and earlier allows an attacker to cause a denial of service and potentially disclose information via crafted SNMP packets to snmp_ber_decode_string_len_buffer in os/net/app-layer/snmp/snmp-ber...

  • EPSS 0.33%
  • Published 18.06.2021 21:15:07
  • Last modified 21.11.2024 05:47:52

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. The RPL-Classic and RPL-Lite implementations in the Contiki-NG operating system versions prior to 4.6 do not validate the address pointer in the RPL source ...

  • EPSS 0.3%
  • Published 18.06.2021 21:15:07
  • Last modified 21.11.2024 05:47:55

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In verions prior to 4.6, an attacker can perform a denial-of-service attack by triggering an infinite loop in the processing of IPv6 neighbor solicitation (...

Exploit
  • EPSS 0.41%
  • Published 18.06.2021 21:15:07
  • Last modified 21.11.2024 05:47:55

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. It is possible to cause an out-of-bounds write in versions of Contiki-NG prior to 4.6 when transmitting a 6LoWPAN packet with a chain of extension headers. ...

  • EPSS 0.44%
  • Published 18.06.2021 21:15:07
  • Last modified 21.11.2024 05:47:55

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. A buffer overflow vulnerability exists in Contiki-NG versions prior to 4.6. After establishing a TCP socket using the tcp-socket library, it is possible for...