![]() The Bluetooth module has an OOM vulnerability. Windows Bluetooth Driver Elevation of Privilege Vulnerability.Ī malicious / defect bluetooth controller can cause a Denial of Service due to unchecked input in le_read_buffer_size_complete.Ī malicious / defective bluetooth controller can cause buffer overreads in the most functions that process HCI command responses. The problem can be fixed by applying the patch in Contiki-NG pull request #2254 prior to the release of version 4.9. The vulnerability has been patched in the "develop" branch of Contiki-NG, and will be included in release 4.9. In Contiki-NG's default configuration, it is possible that an out-of-bounds write of up to 1152 bytes occurs. When fragments are reassembled, they are stored in a packet buffer of a configurable size, but there is no check to verify that the packet buffer is large enough to hold the reassembled packet. The Bluetooth Low Energy - Logical Link Control and Adaptation Layer Protocol (BLE-L2CAP) module handles fragmentation of packets up the configured MTU size. Versions prior to and including 4.8 are vulnerable to an out-of-bounds write that can occur in the BLE-L2CAP module. Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |