First published: Thu Apr 27 2017(Updated: )
Stack-based buffer overflow in the ipv6_addr_from_str function in sys/net/network_layer/ipv6/addr/ipv6_addr_from_str.c in RIOT prior to 2017-04-25 allows local attackers, and potentially remote attackers, to cause a denial of service or possibly have unspecified other impact via a malformed IPv6 address.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Riot OS | <=2017.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8289 is classified as a high-severity vulnerability due to its potential to cause denial of service and other unspecified impacts.
To fix CVE-2017-8289, upgrade to a version of RIOT OS released after April 25, 2017.
CVE-2017-8289 affects users of RIOT OS prior to version 2017.04.25.
CVE-2017-8289 allows local and potentially remote attackers to exploit a stack-based buffer overflow.
The vulnerability in CVE-2017-8289 is located in the ipv6_addr_from_str function.