We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-52802

RIOT-OS missing dhcpv6_opt_t minimum header length check



AssignerGitHub_M
Reserved2024-11-15
Published2024-11-22
Updated2024-11-22

Description

RIOT is an operating system for internet of things (IoT) devices. In version 2024.04 and prior, the function `_parse_advertise`, located in `/sys/net/application_layer/dhcpv6/client.c`, has no minimum header length check for `dhcpv6_opt_t` after processing `dhcpv6_msg_t`. This omission could lead to an out-of-bound read, causing system inconsistency. Additionally, the same lack of a header length check is present in the function `_preparse_advertise`, which is called by `_parse_advertise` before handling the request. As of time of publication, no known patched version exists.



HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Product status

<= 2024.04
affected

References

https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-xgv3-pcq6-qmrg

cve.org CVE-2024-52802

nvd.nist.gov CVE-2024-52802

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-52802
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.