| CVE-2021-40523 |
BDSA-2021-2694 |
High |
Sep 05, 2021 |
In Contiki 3.0, Telnet option negotiation is mishandled. During negotiation between a server and a client, the server may fail to give the WILL/WONT or
more...
In Contiki 3.0, Telnet option negotiation is mishandled. During negotiation between a server and a client, the server may fail to give the WILL/WONT or DO/DONT response for DO and WILL commands because of improper handling of exception condition, which leads to property violations and denial of service. Specifically, a server sometimes sends no response, because a fixed buffer space is available for all responses and that space may have been exhausted.
less...
|
3.0
|
| CVE-2021-38387 |
BDSA-2021-2678 |
High |
Aug 10, 2021 |
In Contiki 3.0, a Telnet server that silently quits (before disconnection with clients) leads to connected clients entering an infinite loop and waitin
more...
In Contiki 3.0, a Telnet server that silently quits (before disconnection with clients) leads to connected clients entering an infinite loop and waiting forever, which may cause excessive CPU consumption.
less...
|
3.0
|
| CVE-2021-38386 |
BDSA-2021-2668 |
High |
Aug 10, 2021 |
In Contiki 3.0, a buffer overflow in the Telnet service allows remote attackers to cause a denial of service because the ls command is mishandled when
more...
In Contiki 3.0, a buffer overflow in the Telnet service allows remote attackers to cause a denial of service because the ls command is mishandled when a directory has many files with long names.
less...
|
3.0
|
| CVE-2021-38311 |
BDSA-2021-2676 |
High |
Aug 09, 2021 |
In Contiki 3.0, potential nonterminating acknowledgment loops exist in the Telnet service. When the negotiated options are already disabled, servers st
more...
In Contiki 3.0, potential nonterminating acknowledgment loops exist in the Telnet service. When the negotiated options are already disabled, servers still respond to DONT and WONT requests with WONT or DONT commands, which may lead to infinite acknowledgment loops, denial of service, and excessive CPU consumption.
less...
|
3.0
|
| CVE-2021-28362 |
BDSA-2021-0776 |
High |
Mar 24, 2021 |
An issue was discovered in Contiki through 3.0. When sending an ICMPv6 error message because of invalid extension header options in an incoming IPv6 pa
more...
An issue was discovered in Contiki through 3.0. When sending an ICMPv6 error message because of invalid extension header options in an incoming IPv6 packet, there is an attempt to remove the RPL extension headers. Because the packet length and the extension header length are unchecked (with respect to the available data) at this stage, and these variables are susceptible to integer underflow, it is possible to construct an invalid extension header that will cause memory corruption issues and lead to a Denial-of-Service condition. This is related to rpl-ext-header.c.
less...
|
3.0, 2.7, 2.6, 2.5, 2.4, 2.3, 2.2.3, 2.2.2, 2.2.1, 2.2
|
| CVE-2020-25112 |
BDSA-2020-3779 |
Critical |
Dec 11, 2020 |
An issue was discovered in the IPv6 stack in Contiki through 3.0. There are inconsistent checks for IPv6 header extension lengths. This leads to Denial
more...
An issue was discovered in the IPv6 stack in Contiki through 3.0. There are inconsistent checks for IPv6 header extension lengths. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.
less...
|
3.0, 2.7, 2.6, 2.5, 2.4, 2.3, 2.2.3, 2.2.2, 2.2.1, 2.2
|
| CVE-2020-25111 |
BDSA-2020-3793 |
Critical |
Dec 11, 2020 |
An issue was discovered in the IPv6 stack in Contiki through 3.0. There is an insufficient check for the IPv6 header length. This leads to Denial-of-Se
more...
An issue was discovered in the IPv6 stack in Contiki through 3.0. There is an insufficient check for the IPv6 header length. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.
less...
|
3.0, 2.7, 2.6, 2.5, 2.4, 2.3, 2.2.3, 2.2.2, 2.2.1, 2.2
|
| CVE-2020-24336 |
BDSA-2020-3796 |
Critical |
Dec 11, 2020 |
An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't veri
more...
An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled.
less...
|
3.0, 2.7, 2.6, 2.5, 2.4, 2.3, 2.2.3, 2.2.2, 2.2.1, 2.2
|
| CVE-2020-13986 |
BDSA-2020-3767 |
High |
Dec 11, 2020 |
An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 n
more...
An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.
less...
|
3.0, 2.7, 2.6, 2.5, 2.4, 2.3, 2.2.3, 2.2.2, 2.2.1, 2.2
|
| CVE-2020-13985 |
BDSA-2020-3768 |
High |
Dec 11, 2020 |
An issue was discovered in Contiki through 3.0. A memory corruption vulnerability exists in the uIP TCP/IP stack component when handling RPL extension
more...
An issue was discovered in Contiki through 3.0. A memory corruption vulnerability exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.
less...
|
3.0, 2.7, 2.6, 2.5, 2.4, 2.3, 2.2.3, 2.2.2, 2.2.1, 2.2
|