Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-3226

Опубликовано: 24 июл. 2018
Источник: nvd
CVSS3: 6.4
CVSS2: 4.4
EPSS Низкий

Описание

Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. Devices that make use of Das U-Boot's AES-CBC encryption feature using environment encryption (i.e., setting the configuration parameter CONFIG_ENV_AES=y) read environment variables from disk as the encrypted disk image is processed. An attacker with physical access to the device can manipulate the encrypted environment data to include a crafted two-byte sequence which triggers an error in environment variable parsing. This error condition is improperly handled by Das U-Boot, resulting in an immediate process termination with a debugging message.

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*
Версия до 2017.09 (исключая)

EPSS

Процентиль: 13%
0.00042
Низкий

6.4 Medium

CVSS3

4.4 Medium

CVSS2

Дефекты

CWE-329
CWE-310

Связанные уязвимости

CVSS3: 6.4
ubuntu
больше 7 лет назад

Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. Devices that make use of Das U-Boot's AES-CBC encryption feature using environment encryption (i.e., setting the configuration parameter CONFIG_ENV_AES=y) read environment variables from disk as the encrypted disk image is processed. An attacker with physical access to the device can manipulate the encrypted environment data to include a crafted two-byte sequence which triggers an error in environment variable parsing. This error condition is improperly handled by Das U-Boot, resulting in an immediate process termination with a debugging message.

CVSS3: 6.4
debian
больше 7 лет назад

Das U-Boot is a device bootloader that can read its configuration from ...

CVSS3: 6.4
github
больше 3 лет назад

Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. Devices that make use of Das U-Boot's AES-CBC encryption feature using environment encryption (i.e., setting the configuration parameter CONFIG_ENV_AES=y) read environment variables from disk as the encrypted disk image is processed. An attacker with physical access to the device can manipulate the encrypted environment data to include a crafted two-byte sequence which triggers an error in environment variable parsing. This error condition is improperly handled by Das U-Boot, resulting in an immediate process termination with a debugging message.

EPSS

Процентиль: 13%
0.00042
Низкий

6.4 Medium

CVSS3

4.4 Medium

CVSS2

Дефекты

CWE-329
CWE-310