VYPR
Unrated severityNVD Advisory· Published Nov 27, 2024· Updated Nov 27, 2024

Out-of-bounds read when decoding SNMP messages in Contiki-NG

CVE-2024-41126

Description

Contiki-NG is an open-source, cross-platform operating system for IoT devices. An out-of-bounds read of 1 byte can be triggered when sending a packet to a device running the Contiki-NG operating system with SNMP enabled. The SNMP module is disabled in the default Contiki-NG configuration. The vulnerability exists in the os/net/app-layer/snmp/snmp-message.c module, where the snmp_message_decode function fails to check the boundary of the message buffer when reading a byte from it immediately after decoding an object identifier (OID). The problem has been patched in Contiki-NG pull request 2937. It will be included in the next release of Contiki-NG. Users are advised to either apply the patch manually or to wait for the next release. A workaround is to disable the SNMP module in the Contiki-NG build configuration.

Affected products

1

Patches

1
fccd6917f6eb

Merge pull request #2937 from OwenCochell/snmp-vuln-message

https://github.com/contiki-ng/contiki-ngNicolas TsiftesJul 16, 2024via osv
1 file changed · +5 0
  • os/net/app-layer/snmp/snmp-message.c+5 0 modified
    @@ -317,6 +317,11 @@ snmp_message_decode(snmp_packet_t *snmp_packet, snmp_header_t *header, snmp_varb
           return 0;
         }
     
    +    if (snmp_packet->used == 0) {
    +      LOG_DBG("Could not decode value type\n");
    +      return 0;
    +    }
    +
         varbinds[i].value_type = *snmp_packet->in;
     
         switch(varbinds[i].value_type) {
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.