CVE-2020-24336

CRITICAL

Contiki <3.0-4.5 - Buffer Overflow

Title source: llm
STIX 2.1

Description

An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled.

References (2)

Core 2
Core References
Third Party Advisory, US Government Resource x_refsource_misc
https://www.kb.cert.org/vuls/id/815128
Third Party Advisory, US Government Resource x_refsource_misc
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01

Scores

CVSS v3 9.8
EPSS 0.0183
EPSS Percentile 83.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-120
Status published
Products (2)
contiki-ng/contiki-ng < 4.5
contiki-os/contiki < 3.0
Published Dec 11, 2020
Tracked Since Feb 18, 2026