Vulnerability Description
In CCN-lite 2, the function ccnl_prefix_to_str_detailed can cause a buffer overflow, when writing a prefix to the buffer buf. The maximal size of the prefix is CCNL_MAX_PREFIX_SIZE; the buffer has the size CCNL_MAX_PREFIX_SIZE. However, when NFN is enabled, additional characters are written to the buffer (e.g., the "NFN" and "R2C" tags). Therefore, sending an NFN-R2C packet with a prefix of size CCNL_MAX_PREFIX_SIZE can cause an overflow of buf inside ccnl_prefix_to_str_detailed.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ccn-Lite | Ccn-Lite | 2.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/cn-uofbasel/ccn-lite/issues/193Third Party Advisory
- https://github.com/cn-uofbasel/ccn-lite/issues/193Third Party Advisory
FAQ
What is CVE-2018-6948?
CVE-2018-6948 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In CCN-lite 2, the function ccnl_prefix_to_str_detailed can cause a buffer overflow, when writing a prefix to the buffer buf. The maximal size of the prefix is CCNL_MAX_PREFIX_SIZE; the buffer has the...
How severe is CVE-2018-6948?
CVE-2018-6948 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-6948?
Check the references section above for vendor advisories and patch information. Affected products include: Ccn-Lite Ccn-Lite.