We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-47181

Unaligned memory access in RPL option processing in Contiki-NG



Description

Contiki-NG is an open-source, cross-platform operating system for IoT devices. An unaligned memory access can be triggered in the two RPL implementations of the Contiki-NG operating system. The problem can occur when either one of these RPL implementations is enabled and connected to an RPL instance. If an IPv6 packet containing an odd number of padded bytes before the RPL option, it can cause the rpl_ext_header_hbh_update function to read a 16-bit integer from an odd address. The impact of this unaligned read is architecture-dependent, but can potentially cause the system to crash. The problem has not been patched as of release 4.9, but will be included in the next release. One can apply the changes in Contiki-NG pull request #2962 to patch the system or wait for the next release.

Reserved 2024-09-19 | Published 2024-11-27 | Updated 2024-11-27 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-704: Incorrect Type Conversion or Cast

Product status

<= 4.9
affected

References

github.com/...iki-ng/security/advisories/GHSA-crjw-x84h-h6x3

github.com/contiki-ng/contiki-ng/pull/2962

cve.org (CVE-2024-47181)

nvd.nist.gov (CVE-2024-47181)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-47181

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.