ccn-lite CVE Vulnerabilities & Metrics

Focus on ccn-lite vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About ccn-lite Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with ccn-lite. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total ccn-lite CVEs: 17
Earliest CVE date: 31 Jan 2018, 20:29 UTC
Latest CVE date: 26 Jun 2018, 13:29 UTC

Latest CVE reference: CVE-2018-12889

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical ccn-lite CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 6.83

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 0
4.0-6.9 6
7.0-8.9 11
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS ccn-lite CVEs

These are the five CVEs with the highest CVSS scores for ccn-lite, sorted by severity first and recency.

All CVEs for ccn-lite

CVE-2018-12889 ccn-lite vulnerability CVSS: 7.5 26 Jun 2018, 13:29 UTC

An issue was discovered in CCN-lite 2.0.1. There is a heap-based buffer overflow in mkAddToRelayCacheRequest and in ccnl_populate_cache for an array lacking '\0' termination when reading a binary CCNx or NDN file. This can result in Heap Corruption. This was addressed by fixing the memory management in mkAddToRelayCacheRequest in ccn-lite-ctrl.c.

CVE-2018-7039 ccn-lite vulnerability CVSS: 7.5 14 Feb 2018, 19:29 UTC

CCN-lite 2.0.0 Beta allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact because the ccnl_ndntlv_prependBlob function in ccnl-pkt-ndntlv.c can be called with wrong arguments. Specifically, there is an incorrect integer data type causing a negative third argument in some cases of crafted TLV data with inconsistent length information.

CVE-2018-6953 ccn-lite vulnerability CVSS: 7.5 13 Feb 2018, 20:29 UTC

In CCN-lite 2, the Parser of NDNTLV does not verify whether a certain component's length field matches the actual component length, which has a resultant buffer overflow and out-of-bounds memory accesses.

CVE-2018-6948 ccn-lite vulnerability CVSS: 7.5 13 Feb 2018, 17:29 UTC

In CCN-lite 2, the function ccnl_prefix_to_str_detailed can cause a buffer overflow, when writing a prefix to the buffer buf. The maximal size of the prefix is CCNL_MAX_PREFIX_SIZE; the buffer has the size CCNL_MAX_PREFIX_SIZE. However, when NFN is enabled, additional characters are written to the buffer (e.g., the "NFN" and "R2C" tags). Therefore, sending an NFN-R2C packet with a prefix of size CCNL_MAX_PREFIX_SIZE can cause an overflow of buf inside ccnl_prefix_to_str_detailed.

CVE-2017-12473 ccn-lite vulnerability CVSS: 5.0 07 Feb 2018, 17:29 UTC

ccnl_ccntlv_bytes2pkt in CCN-lite allows context-dependent attackers to cause a denial of service (application crash) via vectors involving packets with "wrong L values."

CVE-2017-12472 ccn-lite vulnerability CVSS: 7.5 07 Feb 2018, 17:29 UTC

ccnl-ext-mgmt.c in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact by leveraging missing NULL pointer checks after ccnl_malloc.

CVE-2017-12471 ccn-lite vulnerability CVSS: 7.5 07 Feb 2018, 17:29 UTC

The cnb_parse_lev function in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact by leveraging failure to check for out-of-bounds conditions, which triggers an invalid read in the hexdump function.

CVE-2017-12470 ccn-lite vulnerability CVSS: 7.5 07 Feb 2018, 17:29 UTC

Integer overflow in the ndn_parse_sequence function in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact via vectors involving the typ and vallen variables.

CVE-2017-12469 ccn-lite vulnerability CVSS: 7.5 07 Feb 2018, 17:29 UTC

Buffer overflow in util/ccnl-common.c in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact by leveraging incorrect memory allocation.

CVE-2017-12468 ccn-lite vulnerability CVSS: 7.5 07 Feb 2018, 17:29 UTC

Buffer overflow in ccn-lite-ccnb2xml.c in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact via vectors involving the vallen and len variables.

CVE-2017-12467 ccn-lite vulnerability CVSS: 5.0 07 Feb 2018, 17:29 UTC

Memory leak in CCN-lite before 2.00 allows context-dependent attackers to cause a denial of service (memory consumption) by leveraging failure to allocate memory for the comp or complen structure member.

CVE-2017-12466 ccn-lite vulnerability CVSS: 7.5 07 Feb 2018, 17:29 UTC

CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact via vectors related to ssl_halen when running ccn-lite-sim, which trigger an out-of-bounds access.

CVE-2017-12465 ccn-lite vulnerability CVSS: 7.5 07 Feb 2018, 17:29 UTC

Multiple integer overflows in CCN-lite before 2.00 allow context-dependent attackers to have unspecified impact via vectors involving the (1) vallen variable in the iottlv_parse_sequence function or (2) typ, vallen and i variables in the localrpc_parse function.

CVE-2017-12464 ccn-lite vulnerability CVSS: 5.0 07 Feb 2018, 17:29 UTC

ccn-lite-valid.c in CCN-lite before 2.00 allows context-dependent attackers to cause a denial of service (NULL pointer dereference) via vectors involving the keyfile variable.

CVE-2017-12463 ccn-lite vulnerability CVSS: 5.0 07 Feb 2018, 17:29 UTC

Memory leak in the ccnl_app_RX function in ccnl-uapi.c in CCN-lite before 2.00 allows context-dependent attackers to cause a denial of service (memory consumption) via vectors involving an envelope_s structure pointer when the packet format is unknown.

CVE-2017-12412 ccn-lite vulnerability CVSS: 6.8 07 Feb 2018, 17:29 UTC

ccn-lite-ccnb2xml in CCN-lite before 2.0.0 allows context-dependent attackers to have unspecified impact via a crafted file, which triggers infinite recursion and a stack overflow.

CVE-2018-6480 ccn-lite vulnerability CVSS: 6.8 31 Jan 2018, 20:29 UTC

A type confusion issue was discovered in CCN-lite 2, leading to a memory access violation and a failure of the nonce feature (which, for example, helped with loop prevention). ccnl_fwd_handleInterest assumes that the union member s is of type ccnl_pktdetail_ndntlv_s. However, if the type is in fact struct ccnl_pktdetail_ccntlv_s or struct ccnl_pktdetail_iottlv_s, the memory at that point is either uninitialised or points to data that is not a nonce, which renders the code using the local variable nonce pointless. A later nonce check is insufficient.