An issue exists in Contiki up to and including 3.0 and Contiki-NG up to and including 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
contiki-ng contiki-ng |
||
contiki-os contiki |