First published: Fri Sep 15 2023(Updated: )
Contiki-NG is an operating system for internet-of-things devices. In versions 4.9 and prior, when processing the various IPv6 header fields during IPHC header decompression, Contiki-NG confirms the received packet buffer contains enough data as needed for that field. But no similar check is done before decompressing the IPv6 address. Therefore, up to 16 bytes can be read out of bounds on the line with the statement `memcpy(&ipaddr->u8[16 - postcount], iphc_ptr, postcount);`. The value of `postcount` depends on the address compression used in the received packet and can be controlled by the attacker. As a result, an attacker can inject a packet that causes an out-of-bound read. As of time of publication, a patched version is not available. As a workaround, one can apply the changes in Contiki-NG pull request #2509 to patch the system.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Contiki-ng Contiki-ng | <=4.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37281 is a vulnerability in the Contiki-NG operating system for internet-of-things devices.
The severity of CVE-2023-37281 is medium with a CVSS score of 5.3.
CVE-2023-37281 affects Contiki-NG versions up to and including 4.9.
To fix CVE-2023-37281, it is recommended to update Contiki-NG to a version higher than 4.9.
You can find more information about CVE-2023-37281 at the following links: [GitHub Pull Request](https://github.com/contiki-ng/contiki-ng/pull/2509) and [GitHub Security Advisory](https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-2v4c-9p48-g9pr).