CVE-2020-10019 – Buffer Overflow in USB DFU requested length
https://notcve.org/view.php?id=CVE-2020-10019
USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions. USB DFU presenta un potencial desbordamiento del búfer donde la longitud requerida (wLength) no es comparada con el tamaño del búfer. Esto podría ser usado por un host USB malicioso para explotar el desbordamiento del búfer. • https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10019 https://github.com/zephyrproject-rtos/zephyr/pull/23190 https://github.com/zephyrproject-rtos/zephyr/pull/23457 https://github.com/zephyrproject-rtos/zephyr/pull/23460 https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2017-14201 – The shell DNS command can cause unpredictable results due to misuse of stack variables.
https://notcve.org/view.php?id=CVE-2017-14201
Use After Free vulnerability in the Zephyr shell allows a serial or telnet connected user to cause denial of service, and possibly remote code execution. This issue affects: Zephyr shell versions prior to 1.14.0 on all. Usar la vulnerabilidad Después de la liberación en el shell de Zephyr permite que un usuario conectado en serie o telnet cause la denegación de servicio, y posiblemente la ejecución remota de código. Este problema afecta a: las versiones del proyectil Zephyr anteriores a 1.14.0 en todas. • https://docs.zephyrproject.org/1.14.0/releases/release-notes-1.14.html https://github.com/zephyrproject-rtos/zephyr/pull/13260 https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-17 • CWE-416: Use After Free •
CVE-2017-14202 – The shell implementation does not protect against buffer overruns resulting in unpredictable behavior.
https://notcve.org/view.php?id=CVE-2017-14202
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the shell component of Zephyr allows a serial or telnet connected user to cause a crash, possibly with arbitrary code execution. This issue affects: Zephyr shell versions prior to 1.14.0 on all. Una Restricción Inapropiada de Operaciones dentro de los Límites de una vulnerabilidad del Búfer de la Memoria en el componente shell de Zephyr, permite a un usuario conectado serial o telnet causar un bloqueo, posiblemente con la ejecución de código arbitrario. Este problema afecta a: shell de Zephyr versiones anteriores a 1.14.0 sobre todo. • https://docs.zephyrproject.org/1.14.0/releases/release-notes-1.14.html https://github.com/zephyrproject-rtos/zephyr/pull/13048 https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-18 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2017-14199
https://notcve.org/view.php?id=CVE-2017-14199
A buffer overflow has been found in the Zephyr Project's getaddrinfo() implementation in 1.9.0 and 1.10.0. Una vulnerabilidad de tipo buffer overflow ha sido encontrada en la implementación de getaddrinfo() de Zephyr Project, versiones 1.9.0 y 1.10.0. • https://github.com/zephyrproject-rtos/zephyr/pull/6158 https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-12 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2018-1000800
https://notcve.org/view.php?id=CVE-2018-1000800
zephyr-rtos version 1.12.0 contains a NULL base pointer reference vulnerability in sys_ring_buf_put(), sys_ring_buf_get() that can result in CPU Page Fault (error code 0x00000010). This attack appear to be exploitable via a malicious application call the vulnerable kernel APIs (system sys_ring_buf_get() and sys_ring_buf_put). zephyr-rtos 1.12.0 contiene una vulnerabilidad de desreferencia de puntero NULL en sys_ring_buf_put() y sys_ring_buf_get() que puede resultar en un fallo de página de CPU (código de error 0x00000010). El ataque parece ser explotable si una aplicación maliciosa llama a las API (sys_ring_buf_get() y sys_ring_buf_put del sistema) del kernel vulnerable. • https://github.com/zephyrproject-rtos/zephyr/issues/7638 • CWE-476: NULL Pointer Dereference •