CVE-2018-3968
https://notcve.org/view.php?id=CVE-2018-3968
An exploitable vulnerability exists in the verified boot protection of the Das U-Boot from version 2013.07-rc1 to 2014.07-rc2. The affected versions lack proper FIT signature enforcement, which allows an attacker to bypass U-Boot's verified boot and execute an unsigned kernel, embedded in a legacy image format. To trigger this vulnerability, a local attacker needs to be able to supply the image to boot. Existe una vulnerabilidad explotable en la protección verificada de arranque de Das U-Boot, desde la versión 2013.07-rc1 hasta la 2014.07-rc2. Las versiones afectadas carecen de una aplicación adecuada de las firmas FIT, lo que permite que un atacante omita el arranque verificado de U-Boot y ejecute un kernel sin firmar, embebido en un formato de imagen heredado. • https://talosintelligence.com/vulnerability_reports/TALOS-2018-0633 • CWE-347: Improper Verification of Cryptographic Signature •
CVE-2018-18439
https://notcve.org/view.php?id=CVE-2018-18439
DENX U-Boot through 2018.09-rc1 has a remotely exploitable buffer overflow via a malicious TFTP server because TFTP traffic is mishandled. Also, local exploitation can occur via a crafted kernel image. DENX U-Boot hasta el 2018.09-rc1 tiene un desbordamiento de búfer explotable de forma remota mediante un servidor TFTP malicioso debido a que el tráfico TFTP se gestiona de manera incorrecta. Además, podría ocurrir una explotación local mediante una imagen de kernel manipulada. • http://www.openwall.com/lists/oss-security/2018/11/02/2 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2018-18440
https://notcve.org/view.php?id=CVE-2018-18440
DENX U-Boot through 2018.09-rc1 has a locally exploitable buffer overflow via a crafted kernel image because filesystem loading is mishandled. DENX U-Boot hasta el 2018.09-rc1 tiene un desbordamiento de búfer explotable de forma local mediante una imagen del kernel manipulada debido a que la carga del sistema de archivos se gestiona de manera incorrecta. • http://www.openwall.com/lists/oss-security/2018/11/02/2 https://cert-portal.siemens.com/productcert/pdf/ssa-618620.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2017-3225 – Das U-Boot's AES-CBC encryption feature uses a zero (0) initialization vector that may allow attacks against the underlying cryptographic implementation and allow an attacker to decrypt the data
https://notcve.org/view.php?id=CVE-2017-3225
Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. For devices utilizing this environment encryption mode, U-Boot's use of a zero initialization vector may allow attacks against the underlying cryptographic implementation and allow an attacker to decrypt the data. Das U-Boot's AES-CBC encryption feature uses a zero (0) initialization vector. This allows an attacker to perform dictionary attacks on encrypted data produced by Das U-Boot to learn information about the encrypted data. Das U-Boot es un bootloader de dispositivos que puede leer su configuración desde un archivo cifrado por AES. • http://www.securityfocus.com/bid/100675 https://www.kb.cert.org/vuls/id/166743 • CWE-310: Cryptographic Issues CWE-329: Generation of Predictable IV with CBC Mode •
CVE-2017-3226 – Das U-Boot's AES-CBC encryption feature improperly handles an error condition and may allow attacks against the underlying cryptographic implementation and allow an attacker to decrypt the data
https://notcve.org/view.php?id=CVE-2017-3226
Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. Devices that make use of Das U-Boot's AES-CBC encryption feature using environment encryption (i.e., setting the configuration parameter CONFIG_ENV_AES=y) read environment variables from disk as the encrypted disk image is processed. An attacker with physical access to the device can manipulate the encrypted environment data to include a crafted two-byte sequence which triggers an error in environment variable parsing. This error condition is improperly handled by Das U-Boot, resulting in an immediate process termination with a debugging message. Das U-Boot es un bootloader de dispositivos que puede leer su configuración desde un archivo cifrado por AES. • http://www.securityfocus.com/bid/100675 https://www.kb.cert.org/vuls/id/166743 • CWE-310: Cryptographic Issues CWE-329: Generation of Predictable IV with CBC Mode •