ID

VAR-202106-0919


CVE

CVE-2021-21279


TITLE

Contiki-NG  Infinite loop vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-008105

DESCRIPTION

Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In verions prior to 4.6, an attacker can perform a denial-of-service attack by triggering an infinite loop in the processing of IPv6 neighbor solicitation (NS) messages. This type of attack can effectively shut down the operation of the system because of the cooperative scheduling used for the main parts of Contiki-NG and its communication stack. The problem has been patched in Contiki-NG 4.6. Users can apply the patch for this vulnerability out-of-band as a workaround. Contiki-NG Exists in an infinite loop vulnerability.Denial of service (DoS) It may be put into a state. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Attackers can use this vulnerability to effectively shut down the operation of the system

Trust: 3.33

sources: NVD: CVE-2021-21279 // JVNDB: JVNDB-2021-008105 // CNVD: CNVD-2021-44270 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-1425 // VULMON: CVE-2021-21279

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-44270

AFFECTED PRODUCTS

vendor:contiki ngmodel:contiki-ngscope:ltversion:4.6

Trust: 1.6

vendor:contiki ngmodel:contiki-ngscope:eqversion:4.6

Trust: 0.8

vendor:contiki ngmodel:contiki-ngscope:eqversion: -

Trust: 0.8

sources: CNVD: CNVD-2021-44270 // JVNDB: JVNDB-2021-008105 // NVD: CVE-2021-21279

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-21279
value: HIGH

Trust: 1.0

security-advisories@github.com: CVE-2021-21279
value: HIGH

Trust: 1.0

NVD: CVE-2021-21279
value: HIGH

Trust: 0.8

CNVD: CNVD-2021-44270
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202106-1425
value: HIGH

Trust: 0.6

VULMON: CVE-2021-21279
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-21279
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2021-44270
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-21279
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

OTHER: JVNDB-2021-008105
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-44270 // VULMON: CVE-2021-21279 // JVNDB: JVNDB-2021-008105 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-1425 // NVD: CVE-2021-21279 // NVD: CVE-2021-21279

PROBLEMTYPE DATA

problemtype:CWE-835

Trust: 1.0

problemtype:infinite loop (CWE-835) [ Other ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-008105 // NVD: CVE-2021-21279

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202106-1425

TYPE

other

Trust: 1.2

sources: CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-1425

PATCH

title:Infinite loop in IPv6 neighbor solicitation processingurl:https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-rr5j-j8m8-fc4f

Trust: 0.8

title:Patch for Contiki-NG infinite loop vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/274511

Trust: 0.6

title:Contiki-NG Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=154493

Trust: 0.6

sources: CNVD: CNVD-2021-44270 // JVNDB: JVNDB-2021-008105 // CNNVD: CNNVD-202106-1425

EXTERNAL IDS

db:NVDid:CVE-2021-21279

Trust: 3.9

db:JVNDBid:JVNDB-2021-008105

Trust: 0.8

db:CNVDid:CNVD-2021-44270

Trust: 0.6

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:CS-HELPid:SB2021062407

Trust: 0.6

db:CNNVDid:CNNVD-202106-1425

Trust: 0.6

db:VULMONid:CVE-2021-21279

Trust: 0.1

sources: CNVD: CNVD-2021-44270 // VULMON: CVE-2021-21279 // JVNDB: JVNDB-2021-008105 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-1425 // NVD: CVE-2021-21279

REFERENCES

url:https://github.com/contiki-ng/contiki-ng/security/advisories/ghsa-rr5j-j8m8-fc4f

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-21279

Trust: 1.4

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021062407

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/835.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2021-44270 // VULMON: CVE-2021-21279 // JVNDB: JVNDB-2021-008105 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-1425 // NVD: CVE-2021-21279

SOURCES

db:CNVDid:CNVD-2021-44270
db:VULMONid:CVE-2021-21279
db:JVNDBid:JVNDB-2021-008105
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202106-1425
db:NVDid:CVE-2021-21279

LAST UPDATE DATE

2024-08-14T12:12:40.081000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-44270date:2021-06-23T00:00:00
db:VULMONid:CVE-2021-21279date:2021-06-22T00:00:00
db:JVNDBid:JVNDB-2021-008105date:2022-03-03T09:09:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202106-1425date:2021-06-28T00:00:00
db:NVDid:CVE-2021-21279date:2021-06-22T19:15:19.500

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-44270date:2021-06-23T00:00:00
db:VULMONid:CVE-2021-21279date:2021-06-18T00:00:00
db:JVNDBid:JVNDB-2021-008105date:2022-03-03T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202106-1425date:2021-06-18T00:00:00
db:NVDid:CVE-2021-21279date:2021-06-18T21:15:07.667