ID

VAR-202305-0517


CVE

CVE-2023-31129


TITLE

Contiki-NG  In  NULL  Pointer dereference vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2023-010063

DESCRIPTION

The Contiki-NG operating system versions 4.8 and prior can be triggered to dereference a NULL pointer in the message handling code for IPv6 router solicitiations. Contiki-NG contains an implementation of IPv6 Neighbor Discovery (ND) in the module `os/net/ipv6/uip-nd6.c`. The ND protocol includes a message type called Router Solicitation (RS), which is used to locate routers and update their address information via the SLLAO (Source Link-Layer Address Option). If the indicated source address changes, a given neighbor entry is set to the STALE state. The message handler does not check for RS messages with an SLLAO that indicates a link-layer address change that a neighbor entry can actually be created for the indicated address. The resulting pointer is used without a check, leading to the dereference of a NULL pointer of type `uip_ds6_nbr_t`. The problem has been patched in the `develop` branch of Contiki-NG, and will be included in the upcoming 4.9 release. As a workaround, users can apply Contiki-NG pull request #2271 to patch the problem directly. Contiki-NG for, NULL There is a vulnerability in pointer dereference.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Contiki-NG is an open-source, cross-platform operating system for next-generation IoT (Internet of Things) devices

Trust: 2.25

sources: NVD: CVE-2023-31129 // JVNDB: JVNDB-2023-010063 // CNNVD: CNNVD-202305-460 // VULMON: CVE-2023-31129

AFFECTED PRODUCTS

vendor:contiki ngmodel:contiki-ngscope:lteversion:4.8

Trust: 1.0

vendor:contiki ngmodel:contiki-ngscope:eqversion: -

Trust: 0.8

vendor:contiki ngmodel:contiki-ngscope:lteversion:4.8 and earlier

Trust: 0.8

vendor:contiki ngmodel:contiki-ngscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-010063 // NVD: CVE-2023-31129

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-31129
value: CRITICAL

Trust: 1.0

security-advisories@github.com: CVE-2023-31129
value: HIGH

Trust: 1.0

NVD: CVE-2023-31129
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202305-460
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2023-31129
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

security-advisories@github.com: CVE-2023-31129
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2023-31129
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-010063 // CNNVD: CNNVD-202305-460 // NVD: CVE-2023-31129 // NVD: CVE-2023-31129

PROBLEMTYPE DATA

problemtype:CWE-476

Trust: 1.0

problemtype:NULL Pointer dereference (CWE-476) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-010063 // NVD: CVE-2023-31129

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202305-460

PATCH

title:Contiki-NG Fixes for code issue vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=236254

Trust: 0.6

sources: CNNVD: CNNVD-202305-460

EXTERNAL IDS

db:NVDid:CVE-2023-31129

Trust: 3.3

db:JVNDBid:JVNDB-2023-010063

Trust: 0.8

db:CNNVDid:CNNVD-202305-460

Trust: 0.6

db:VULMONid:CVE-2023-31129

Trust: 0.1

sources: VULMON: CVE-2023-31129 // JVNDB: JVNDB-2023-010063 // CNNVD: CNNVD-202305-460 // NVD: CVE-2023-31129

REFERENCES

url:https://github.com/contiki-ng/contiki-ng/pull/2271

Trust: 2.5

url:https://github.com/contiki-ng/contiki-ng/security/advisories/ghsa-x29r-5qjg-75mq

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2023-31129

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2023-31129/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/476.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-31129 // JVNDB: JVNDB-2023-010063 // CNNVD: CNNVD-202305-460 // NVD: CVE-2023-31129

SOURCES

db:VULMONid:CVE-2023-31129
db:JVNDBid:JVNDB-2023-010063
db:CNNVDid:CNNVD-202305-460
db:NVDid:CVE-2023-31129

LAST UPDATE DATE

2024-08-14T14:24:05.887000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-31129date:2023-05-09T00:00:00
db:JVNDBid:JVNDB-2023-010063date:2023-12-07T07:24:00
db:CNNVDid:CNNVD-202305-460date:2023-05-15T00:00:00
db:NVDid:CVE-2023-31129date:2023-05-15T18:05:51.943

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-31129date:2023-05-08T00:00:00
db:JVNDBid:JVNDB-2023-010063date:2023-12-07T00:00:00
db:CNNVDid:CNNVD-202305-460date:2023-05-08T00:00:00
db:NVDid:CVE-2023-31129date:2023-05-08T21:15:11.513