CVE-2021-27421 – NXP MCUXpresso SDK Integer Overflow or Wraparound
https://notcve.org/view.php?id=CVE-2021-27421
NXP MCUXpresso SDK versions prior to 2.8.2 are vulnerable to integer overflow in SDK_Malloc function, which could allow to access memory locations outside the bounds of a specified array, leading to unexpected behavior such segmentation fault when assigning a particular block of memory from the heap via malloc. NXP MCUXpresso SDK versiones anteriores a 2.8.2, son vulnerables a un desbordamiento de enteros en la función SDK_Malloc, que podría permitir el acceso a ubicaciones de memoria fuera de los límites de una matriz especificada, conllevando a un comportamiento no esperado, como un fallo de segmentación, cuando es asignado un bloque concreto de memoria de la pila por medio de malloc • https://mcuxpresso.nxp.com/en/welcome https://www.cisa.gov/uscert/ics/advisories/icsa-21-119-04 • CWE-190: Integer Overflow or Wraparound •
CVE-2021-38260
https://notcve.org/view.php?id=CVE-2021-38260
NXP MCUXpresso SDK v2.7.0 was discovered to contain a buffer overflow in the function USB_HostParseDeviceConfigurationDescriptor(). Se ha detectado que NXP MCUXpresso SDK versión v2.7.0, contiene un desbordamiento de búfer en la función USB_HostParseDeviceConfigurationDescriptor() • https://mcusec.github.io/vulnerabilities_details#nxp_usb • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2021-38258
https://notcve.org/view.php?id=CVE-2021-38258
NXP MCUXpresso SDK v2.7.0 was discovered to contain a buffer overflow in the function USB_HostProcessCallback(). Se ha detectado que NXP MCUXpresso SDK versión v2.7.0, contiene un desbordamiento de búfer en la función USB_HostProcessCallback() • https://mcusec.github.io/vulnerabilities_details#nxp_usb • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2019-17519
https://notcve.org/view.php?id=CVE-2019-17519
The Bluetooth Low Energy implementation on NXP SDK through 2.2.1 for KW41Z devices does not properly restrict the Link Layer payload length, allowing attackers in radio range to cause a buffer overflow via a crafted packet. La implementación de Bluetooth Low Energy en NXP SDK versiones hasta 2.2.1 para dispositivos KW41Z no restringe apropiadamente la longitud de la carga útil de Link Layer, lo que permite a atacantes dentro del radio de alcance causar un desbordamiento del búfer por medio de un paquete diseñado. • https://asset-group.github.io/disclosures/sweyntooth • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2019-17060
https://notcve.org/view.php?id=CVE-2019-17060
The Bluetooth Low Energy (BLE) stack implementation on the NXP KW41Z (based on the MCUXpresso SDK with Bluetooth Low Energy Driver 2.2.1 and earlier) does not properly restrict the BLE Link Layer header and executes certain memory contents upon receiving a packet with a Link Layer ID (LLID) equal to zero. This allows attackers within radio range to cause deadlocks, cause anomalous behavior in the BLE state machine, or trigger a buffer overflow via a crafted BLE Link Layer frame. La implementación de la pila de Bluetooth Low Energy (BLE) en el NXP KW41Z (basada en MCUXpresso SDK con Bluetooth Low Energy Driver versión 2.2.1 y anteriores), no restringe apropiadamente el encabezado BLE Link Layer y ejecuta determinados contenidos de memoria tras recibir un paquete con un Link Layer ID (LLID) igual a cero. Esto permite a atacantes dentro del radio de alcance causar puntos muertos, un comportamiento anómalo en la máquina de estado BLE o desencadenar un desbordamiento del búfer por medio de una trama BLE Link Layer diseñada. • https://asset-group.github.io/disclosures/sweyntooth https://www.nxp.com/products/wireless/bluetooth-low-energy:BLUETOOTH-LOW-ENERGY-BLE • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •