RIOT-OS vulnerable to Out of Bounds Write in _rbuf_add
CVE-2023-33975
What is CVE-2023-33975?
RIOT-OS, a popular operating system designed for Internet of Things (IoT) devices, is vulnerable due to its network stack's processing of 6LoWPAN frames. In versions prior to 2023.01, an attacker can exploit this vulnerability by sending a specially crafted frame to the device, leading to an out of bounds write in the packet buffer. This overflow may corrupt other packets and potentially the allocator's metadata. Such corruption allows an attacker to manipulate pointers, which can trigger denial of service or even execute arbitrary code by writing to unintended memory locations. This issue has been addressed in pull request 19680, and it is recommended to disable support for fragmented IP datagrams as an initial workaround.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
RIOT <= 2023.01
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
