一、 漏洞 CVE-2023-28116 基础信息
漏洞标题
因配置错误而导致的L2CAP中缓冲区溢出
来源:AIGC 神龙大模型
漏洞描述信息
由于MTU配置错误,L2CAP存在缓冲区溢出问题
来源:AIGC 神龙大模型
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
来源:AIGC 神龙大模型
漏洞类别
N/A
来源:AIGC 神龙大模型
漏洞标题
Buffer overflow in L2CAP due to misconfigured MTU
来源:美国国家漏洞数据库 NVD
漏洞描述信息
Contiki-NG is an open-source, cross-platform operating system for internet of things (IoT) devices. In versions 4.8 and prior, an out-of-bounds write can occur in the BLE L2CAP module of the Contiki-NG operating system. The network stack of Contiki-NG uses a global buffer (packetbuf) for processing of packets, with the size of PACKETBUF_SIZE. In particular, when using the BLE L2CAP module with the default configuration, the PACKETBUF_SIZE value becomes larger then the actual size of the packetbuf. When large packets are processed by the L2CAP module, a buffer overflow can therefore occur when copying the packet data to the packetbuf. The vulnerability has been patched in the "develop" branch of Contiki-NG, and will be included in release 4.9. The problem can be worked around by applying the patch manually.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
来源:美国国家漏洞数据库 NVD
漏洞类别
未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出)
来源:美国国家漏洞数据库 NVD
漏洞标题
Contiki-NG 缓冲区错误漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Contiki-NG是一套用于下一代IoT(物联网)设备的开源跨平台操作系统。 Contiki-NG 4.8版本及之前版本存在安全漏洞,该漏洞源于当L2CAP模块处理大数据包时,将数据包数据复制到packetbuf时可能会发生缓冲区溢出。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
缓冲区错误
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2023-28116 的公开POC
# POC 描述 源链接 神龙链接
三、漏洞 CVE-2023-28116 的情报信息