Buffer overflow in L2CAP due to misconfigured MTU
CVE-2023-28116

8.1HIGH

Key Information:

Vendor

Contiki-ng

Vendor
CVE Published:
17 March 2023

What is CVE-2023-28116?

Contiki-NG, an open-source operating system designed for IoT devices, is vulnerable to an out-of-bounds write in its BLE L2CAP module in versions 4.8 and earlier. The issue arises from a global buffer, 'packetbuf', utilized in the network stack for handling packets. With the default configuration, the defined PACKETBUF_SIZE can exceed the actual size of the packetbuf, leading to a potential buffer overflow when processing large packets. This vulnerability can be exploited, but it has been addressed in the 'develop' branch of the software and will be fixed in the upcoming release, version 4.9. Users are encouraged to apply the provided patch manually as a workaround.

Affected Version(s)

contiki-ng <= 4.8

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.