Lucene search

K
cve[email protected]CVE-2023-31129
HistoryMay 08, 2023 - 9:15 p.m.

CVE-2023-31129

2023-05-0821:15:11
CWE-476
web.nvd.nist.gov
89
contiki-ng
operating system
cve-2023-31129
security vulnerability
ipv6
router solicitation
null pointer
code patch

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.2 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

65.7%

The Contiki-NG operating system versions 4.8 and prior can be triggered to dereference a NULL pointer in the message handling code for IPv6 router solicitiations. Contiki-NG contains an implementation of IPv6 Neighbor Discovery (ND) in the module os/net/ipv6/uip-nd6.c. The ND protocol includes a message type called Router Solicitation (RS), which is used to locate routers and update their address information via the SLLAO (Source Link-Layer Address Option). If the indicated source address changes, a given neighbor entry is set to the STALE state.

The message handler does not check for RS messages with an SLLAO that indicates a link-layer address change that a neighbor entry can actually be created for the indicated address. The resulting pointer is used without a check, leading to the dereference of a NULL pointer of type uip_ds6_nbr_t.

The problem has been patched in the develop branch of Contiki-NG, and will be included in the upcoming 4.9 release. As a workaround, users can apply Contiki-NG pull request #2271 to patch the problem directly.

Affected configurations

Vulners
NVD
Node
contiki-ngcontiki-ng.Range4.8
VendorProductVersionCPE
contiki\-ngcontiki\-ng\.*cpe:2.3:o:contiki\-ng:contiki\-ng\.:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "contiki-ng",
    "product": "contiki-ng",
    "versions": [
      {
        "version": "<= 4.8",
        "status": "affected"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.2 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

65.7%

Related for CVE-2023-31129