Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vh3x-525m-jp4r

Опубликовано: 17 сент. 2024
Источник: github
Github: Прошло ревью
CVSS4: 6.9
CVSS3: 7.3

Описание

heap-buffer-overflow in MicroPython

A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected by this issue is the function mpz_as_bytes of the file py/objint.c. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 908ab1ceca15ee6fd0ef82ca4cba770a3ec41894. It is recommended to apply a patch to fix this issue. In micropython objint component, converting zero from int to bytes leads to heap buffer-overflow-write at mpz_as_bytes.

Пакеты

Наименование

micropython-copy

pip
Затронутые версииВерсия исправления

<= 3.3.3.post3

Отсутствует

Наименование

micropython-io

pip
Затронутые версииВерсия исправления

<= 0.1

Отсутствует

Наименование

micropython-os

pip
Затронутые версииВерсия исправления

<= 0.8

Отсутствует

EPSS

Процентиль: 31%
0.0012
Низкий

6.9 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-122
CWE-787

Связанные уязвимости

CVSS3: 7.3
ubuntu
больше 1 года назад

A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected by this issue is the function mpz_as_bytes of the file py/objint.c. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 908ab1ceca15ee6fd0ef82ca4cba770a3ec41894. It is recommended to apply a patch to fix this issue. In micropython objint component, converting zero from int to bytes leads to heap buffer-overflow-write at mpz_as_bytes.

CVSS3: 7.3
nvd
больше 1 года назад

A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected by this issue is the function mpz_as_bytes of the file py/objint.c. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 908ab1ceca15ee6fd0ef82ca4cba770a3ec41894. It is recommended to apply a patch to fix this issue. In micropython objint component, converting zero from int to bytes leads to heap buffer-overflow-write at mpz_as_bytes.

CVSS3: 7.3
debian
больше 1 года назад

A vulnerability was found in MicroPython 1.23.0. It has been rated as ...

EPSS

Процентиль: 31%
0.0012
Низкий

6.9 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-122
CWE-787