An issue was discovered in Contiki-NG through 4.3 and Contiki through 3.0. A buffer overflow is present due to an integer underflow during 6LoWPAN fragment processing in the face of truncated fragments in os/net/ipv6/sicslowpan.c. This results in accesses of unmapped memory, crashing the application. An attacker can cause a denial-of-service via a crafted 6LoWPAN frame.
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
Link | Tags |
---|---|
https://github.com/contiki-ng/contiki-ng/pull/972 | third party advisory patch |
https://github.com/contiki-ng/contiki-ng/releases/tag/release%2Fv4.4 | third party advisory release notes |
https://www.usenix.org/system/files/sec20summer_clements_prepub.pdf | third party advisory technical description |