DescriptionAn issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled.
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
Note from the SUSE Security TeamSUSE does not ship the uIP stack, also the affected code is not in open-iscsi, so SUSE is not affected by this problem. SUSE Bugzilla entry: 1179907 [NEW] No SUSE Security Announcements cross referenced.
SUSE Timeline for this CVECVE page created: Thu Dec 10 17:28:55 2020
CVE page last modified: Fri Oct 7 12:50:57 2022