Unrated severityNVD Advisory· Published Jun 18, 2021· Updated Aug 3, 2024
Buffer overflow due to unvalidated TCP data offset
CVE-2021-21281
Description
Contiki-NG is an open-source, cross-platform operating system for internet of things devices. A buffer overflow vulnerability exists in Contiki-NG versions prior to 4.6. After establishing a TCP socket using the tcp-socket library, it is possible for the remote end to send a packet with a data offset that is unvalidated. The problem has been patched in Contiki-NG 4.6. Users can apply the patch for this vulnerability out-of-band as a workaround.
Affected products
1- Range: < 4.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/contiki-ng/contiki-ng/pull/1366mitrex_refsource_MISC
- github.com/contiki-ng/contiki-ng/security/advisories/GHSA-mc42-fqfr-h9fpmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.