
CVE-2020-10071 – Insufficient publish message length validation in MQTT
https://notcve.org/view.php?id=CVE-2020-10071
05 Jun 2020 — The Zephyr MQTT parsing code performs insufficient checking of the length field on publish messages, allowing a buffer overflow and potentially remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions. El código de análisis de Zephyr MQTT realiza una comprobación insuficiente del campo de longitud en los mensajes de publicación, lo que permite un desbordamiento del búfer y potencialmente una ejecución de código remota. NCC-ZEP-031 Este problema afecta... • https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10071 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-129: Improper Validation of Array Index •

CVE-2020-10070 – MQTT buffer overflow on receive buffer
https://notcve.org/view.php?id=CVE-2020-10070
05 Jun 2020 — In the Zephyr Project MQTT code, improper bounds checking can result in memory corruption and possibly remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions. En el código de Zephyr Project MQTT, la comprobación incorrecta de los límites puede resultar en corrupción de la memoria y potencialmente en una ejecución de código remota. NCC-ZEP-031 Este problema afecta a: zephyrproject-rtos zephyr versión 2.2.0 y versiones posteriores • https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10070 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-190: Integer Overflow or Wraparound •

CVE-2020-10068 – Zephyr Bluetooth DLE duplicate requests vulnerability
https://notcve.org/view.php?id=CVE-2020-10068
05 Jun 2020 — In the Zephyr project Bluetooth subsystem, certain duplicate and back-to-back packets can cause incorrect behavior, resulting in a denial of service. This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions, and version 1.14.0 and later versions. En el subsistema Bluetooth de Zephyr project, determinados paquetes duplicados y consecutivos pueden causar un comportamiento incorrecto, resultando en una denegación de servicio. Este problema afecta a: zephyrproject-rtos zephyr versión 2.2.0... • https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10068 • CWE-20: Improper Input Validation •

CVE-2020-10063 – Remote Denial of Service in CoAP Option Parsing Due To Integer Overflow
https://notcve.org/view.php?id=CVE-2020-10063
05 Jun 2020 — A remote adversary with the ability to send arbitrary CoAP packets to be parsed by Zephyr is able to cause a denial of service. This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions. Un adversario remoto con la capacidad de enviar paquetes arbitrarios de CoAP para que sean analizados por Zephyr, puede causar una denegación de servicio. Este problema afecta a: zephyrproject-rtos zephyr versión 2.2.0 y versiones posteriores • https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10063 • CWE-190: Integer Overflow or Wraparound •

CVE-2020-10062 – Packet length decoding error in MQTT
https://notcve.org/view.php?id=CVE-2020-10062
05 Jun 2020 — An off-by-one error in the Zephyr project MQTT packet length decoder can result in memory corruption and possible remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions. Un error por un paso (off-by-one) en el decodificador de longitud de paquetes MQTT del proyecto Zephyr puede resultar en una corrupción de la memoria y una potencial ejecución de código remota. NCC-ZEP-031 Este problema afecta a: zephyrproject-rtos zephyr versión 2.2.0 y versiones p... • https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10062 • CWE-193: Off-by-one Error •

CVE-2020-10061 – Error handling invalid packet sequence
https://notcve.org/view.php?id=CVE-2020-10061
05 Jun 2020 — Improper handling of the full-buffer case in the Zephyr Bluetooth implementation can result in memory corruption. This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions, and version 1.14.0 and later versions. El manejo inapropiado del caso full-buffer en la implementación de Zephyr Bluetooth puede resultar en una corrupción en la memoria. Este problema afecta a: zephyrproject-rtos zephyr versión 2.2.0 y versiones posteriores, y versión 1.14.0 y versiones posteriores • https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10061 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-787: Out-of-bounds Write •

CVE-2020-10067 – Integer Overflow In is_in_region Allows User Thread To Access Kernel Memory
https://notcve.org/view.php?id=CVE-2020-10067
11 May 2020 — A malicious userspace application can cause a integer overflow and bypass security checks performed by system call handlers. The impact would depend on the underlying system call and can range from denial of service to information leak to memory corruption resulting in code execution within the kernel. See NCC-ZEP-005 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions. Una aplicación de espacio de usuario maliciosa puede causar un desbordamiento... • https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10067 • CWE-190: Integer Overflow or Wraparound •

CVE-2020-10060 – UpdateHub Might Dereference An Uninitialized Pointer
https://notcve.org/view.php?id=CVE-2020-10060
11 May 2020 — In updatehub_probe, right after JSON parsing is complete, objects\[1] is accessed from the output structure in two different places. If the JSON contained less than two elements, this access would reference unitialized stack memory. This could result in a crash, denial of service, or possibly an information leak. Provided the fix in CVE-2020-10059 is applied, the attack requires compromise of the server. See NCC-ZEP-030 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version ... • https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10060 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-824: Access of Uninitialized Pointer •

CVE-2020-10059 – UpdateHub Module Explicitly Disables TLS Verification
https://notcve.org/view.php?id=CVE-2020-10059
11 May 2020 — The UpdateHub module disables DTLS peer checking, which allows for a man in the middle attack. This is mitigated by firmware images requiring valid signatures. However, there is no benefit to using DTLS without the peer checking. See NCC-ZEP-018 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. El módulo UpdateHub deshabilita la comprobación del peer DTLS, lo que permite un ataque de tipo man in the middle. • https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10059 • CWE-295: Improper Certificate Validation •

CVE-2020-10058 – Multiple Syscalls In kscan Subsystem Performs No Argument Validation
https://notcve.org/view.php?id=CVE-2020-10058
11 May 2020 — Multiple syscalls in the Kscan subsystem perform insufficient argument validation, allowing code executing in userspace to potentially gain elevated privileges. See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. Múltiples llamadas al sistema en el subsistema Kscan llevan a cabo una comprobación de argumento insuficiente, permitiendo una ejecución de código en el espacio de usuario para potencialmente alcanzar elevados privilegios. Consulte NCC-ZEP-006. Este probl... • https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10058 • CWE-20: Improper Input Validation •