Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-2347

Опубликовано: 23 сент. 2022
Источник: debian
EPSS Низкий

Описание

There exists an unchecked length field in UBoot. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and it does not verify that the transfer direction corresponds to the specified command. Consequently, if a physical attacker crafts a USB DFU download setup packet with a `wLength` greater than 4096 bytes, they can write beyond the heap-allocated request buffer.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
u-bootfixed2023.01~rc2+dfsg-1experimentalpackage
u-bootfixed2023.01~rc4+dfsg-2package
u-bootno-dsabusterpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2022/07/08/2

  • https://source.denx.de/u-boot/u-boot/-/commit/fbce985e28eaca3af82afecc11961aadaf971a7e (v2023.01-rc2)

EPSS

Процентиль: 9%
0.00034
Низкий

Связанные уязвимости

CVSS3: 7.7
ubuntu
больше 3 лет назад

There exists an unchecked length field in UBoot. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and it does not verify that the transfer direction corresponds to the specified command. Consequently, if a physical attacker crafts a USB DFU download setup packet with a `wLength` greater than 4096 bytes, they can write beyond the heap-allocated request buffer.

CVSS3: 7.7
nvd
больше 3 лет назад

There exists an unchecked length field in UBoot. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and it does not verify that the transfer direction corresponds to the specified command. Consequently, if a physical attacker crafts a USB DFU download setup packet with a `wLength` greater than 4096 bytes, they can write beyond the heap-allocated request buffer.

CVSS3: 7.1
github
больше 3 лет назад

There exists an unchecked length field in UBoot. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and it does not verify that the transfer direction corresponds to the specified command. Consequently, if a physical attacker crafts a USB DFU download setup packet with a `wLength` greater than 4096 bytes, they can write beyond the heap-allocated request buffer.

CVSS3: 7.7
fstec
почти 4 года назад

Уязвимость компонента drivers/usb/gadget/f_dfu.c загрузчика U-Boot, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 9%
0.00034
Низкий