Upstream information
Description
An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
Note from the SUSE Security Team
SUSE does not ship the uIP stack, also the affected code is not in open-iscsi, so SUSE is not affected by this problem. SUSE Bugzilla entry: 1179907 [NEW] No SUSE Security Announcements cross referenced.SUSE Timeline for this CVE
CVE page created: Thu Dec 10 17:28:55 2020CVE page last modified: Fri Oct 7 12:50:57 2022