First published: Wed Nov 21 2018(Updated: )
An issue was discovered in the MQTT server in Contiki-NG before 4.2. The function parse_publish_vhdr() that parses MQTT PUBLISH messages with a variable length header uses memcpy to input data into a fixed size buffer. The allocated buffer can fit only MQTT_MAX_TOPIC_LENGTH (default 64) bytes, and a length check is missing. This could lead to Remote Code Execution via a stack-smashing attack (overwriting the function return address). Contiki-NG does not separate the MQTT server from other servers and the OS modules, so access to all memory regions is possible.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Contiki-ng Contiki-ng | <4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19417 is an issue with the MQTT server in Contiki-NG before version 4.2 that allows for a buffer overflow vulnerability.
CVE-2018-19417 is considered as critical with a severity value of 10.
Contiki-NG versions up to, but excluding 4.2, are affected by CVE-2018-19417.
To fix CVE-2018-19417, it is recommended to update Contiki-NG to version 4.2 or later.
More information about CVE-2018-19417 can be found at the following link: [GitHub Issue](https://github.com/contiki-ng/contiki-ng/issues/600).