Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q368-635x-gcfv

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In IoT Devices SDK, there is an implementation of calloc() that doesn't have a length check. An attacker could pass in memory objects larger than the buffer and wrap around to have a smaller buffer than required, allowing the attacker access to the other parts of the heap. We recommend upgrading the Google Cloud IoT Device SDK for Embedded C used to 1.0.3 or greater.

In IoT Devices SDK, there is an implementation of calloc() that doesn't have a length check. An attacker could pass in memory objects larger than the buffer and wrap around to have a smaller buffer than required, allowing the attacker access to the other parts of the heap. We recommend upgrading the Google Cloud IoT Device SDK for Embedded C used to 1.0.3 or greater.

EPSS

Процентиль: 7%
0.00026
Низкий

Дефекты

CWE-120

Связанные уязвимости

CVSS3: 6.3
nvd
почти 5 лет назад

In IoT Devices SDK, there is an implementation of calloc() that doesn't have a length check. An attacker could pass in memory objects larger than the buffer and wrap around to have a smaller buffer than required, allowing the attacker access to the other parts of the heap. We recommend upgrading the Google Cloud IoT Device SDK for Embedded C used to 1.0.3 or greater.

EPSS

Процентиль: 7%
0.00026
Низкий

Дефекты

CWE-120