First published: Thu Sep 01 2022(Updated: )
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The low-power IPv6 network stack of Contiki-NG has a buffer module (os/net/ipv6/uipbuf.c) that processes IPv6 extension headers in incoming data packets. As part of this processing, the function uipbuf_get_next_header casts a pointer to a uip_ext_hdr structure into the packet buffer at different offsets where extension headers are expected to be found, and then reads from this structure. Because of a lack of bounds checking, the casting can be done so that the structure extends beyond the packet's end. Hence, with a carefully crafted packet, it is possible to cause the Contiki-NG system to read data outside the packet buffer. A patch that fixes the vulnerability is included in Contiki-NG 4.8.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Contiki-ng Contiki-ng | <4.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36053 is a vulnerability in Contiki-NG, an open-source operating system for IoT devices, that allows remote attackers to cause a denial-of-service (DoS) condition by sending specially crafted IPv6 extension headers in data packets.
The severity of CVE-2022-36053 is rated as high with a severity value of 8.8 (out of 10).
CVE-2022-36053 affects Contiki-NG versions up to exclusive version 4.8.
To fix CVE-2022-36053, update Contiki-NG to a version that is not affected by the vulnerability.
Yes, you can find more information about CVE-2022-36053 in the Contiki-NG GitHub repository and security advisories.