Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-14199

Опубликовано: 31 июл. 2019
Источник: debian
EPSS Низкий

Описание

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
u-bootfixed2020.01+dfsg-1package
u-bootignoredbusterpackage
u-bootno-dsastretchpackage
u-bootno-dsajessiepackage

Примечания

  • https://blog.semmle.com/uboot-rce-nfs-vulnerability/

  • https://gitlab.denx.de/u-boot/u-boot/commit/fe7288069d2e6659117049f7d27e261b550bb725

EPSS

Процентиль: 67%
0.0054
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call.

CVSS3: 9.8
nvd
больше 6 лет назад

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call.

msrc
5 месяцев назад

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call.

CVSS3: 9.8
github
больше 3 лет назад

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call.

CVSS3: 9.8
fstec
больше 6 лет назад

Уязвимость функции net_process_received_packet компонента net/net.c загрузчика U-Boot, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 67%
0.0054
Низкий