Описание
USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.
Ссылки
- PatchThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- Third Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.14.2 (исключая)Версия от 2.0.0 (включая) до 2.1.0 (включая)
Одно из
cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*
cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*
EPSS
Процентиль: 25%
0.00089
Низкий
8.1 High
CVSS3
7.8 High
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-120
CWE-120
Связанные уязвимости
github
больше 3 лет назад
USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.
EPSS
Процентиль: 25%
0.00089
Низкий
8.1 High
CVSS3
7.8 High
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-120
CWE-120