We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-52802

RIOT-OS missing dhcpv6_opt_t minimum header length check



Description

RIOT is an operating system for internet of things (IoT) devices. In version 2024.04 and prior, the function `_parse_advertise`, located in `/sys/net/application_layer/dhcpv6/client.c`, has no minimum header length check for `dhcpv6_opt_t` after processing `dhcpv6_msg_t`. This omission could lead to an out-of-bound read, causing system inconsistency. Additionally, the same lack of a header length check is present in the function `_preparse_advertise`, which is called by `_parse_advertise` before handling the request. As of time of publication, no known patched version exists.

Reserved 2024-11-15 | Published 2024-11-22 | Updated 2024-11-25 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-20: Improper Input Validation

CWE-125: Out-of-bounds Read

Product status

<= 2024.04
affected

References

github.com/...S/RIOT/security/advisories/GHSA-xgv3-pcq6-qmrg

cve.org (CVE-2024-52802)

nvd.nist.gov (CVE-2024-52802)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-52802

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.