First published: Tue Jul 07 2020(Updated: )
A memory leak in Openthread's wpantund versions up to commit 0e5d1601febb869f583e944785e5685c6c747be7, when used in an environment where wpanctl is directly interfacing with the control driver (eg: debug environments) can allow an attacker to crash the service (DoS). We recommend updating, or to restrict access in your debug environments.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenThread | <=2020-05-28 |
https://github.com/openthread/wpantund/pull/468/commits/0e5d1601febb869f583e944785e5685c6c747be7
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8916 has a severity that can lead to a denial of service (DoS) due to a memory leak.
To fix CVE-2020-8916, update wpantund to a version beyond the commit 0e5d1601febb869f583e944785e5685c6c747be7.
CVE-2020-8916 affects all wpantund versions up to the commit dated 2020-05-28.
CVE-2020-8916 can be exploited in environments where wpanctl directly interfaces with the control driver, leading to a service crash.
Yes, CVE-2020-8916 is directly related to the OpenThread implementation of wpantund.