5 results (0.021 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 2

An issue was discovered in Connected Vehicle Systems Alliance (COVESA) dlt-daemon through 2.18.8. Due to a faulty DLT file parser, a crafted DLT file that crashes the process can be created. This is due to missing validation checks. There is a heap-based buffer over-read of one byte. Se ha detectado un problema en el dlt-daemon de Connected Vehicle Systems Alliance (COVESA) versiones hasta 2.18.8. • https://lists.debian.org/debian-lts-announce/2024/06/msg00021.html https://sec-consult.com/vulnerability-lab/advisory/multiple-memory-corruption-vulnerabilities-in-covesa-dlt-daemon https://seclists.org/fulldisclosure/2022/Sep/24 • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 2

An issue was discovered in Connected Vehicle Systems Alliance (COVESA) dlt-daemon through 2.18.8. Due to a faulty DLT file parser, a crafted DLT file that crashes the process can be created. This is due to missing validation checks. There is a NULL pointer dereference, Se ha detectado un problema en Connected Vehicle Systems Alliance (COVESA) dlt-daemon versiones hasta 2.18.8. Debido a un analizador de archivos DLT defectuoso, puede crearse un archivo DLT diseñado que bloquea el proceso. • https://lists.debian.org/debian-lts-announce/2024/06/msg00021.html https://sec-consult.com/vulnerability-lab/advisory/multiple-memory-corruption-vulnerabilities-in-covesa-dlt-daemon https://seclists.org/fulldisclosure/2022/Sep/24 • CWE-476: NULL Pointer Dereference •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

GENIVI Diagnostic Log and Trace (DLT) provides a log and trace interface. In versions of GENIVI DLT between 2.10.0 and 2.18.6, a configuration file containing the special characters could cause a vulnerable component to crash. All the applications which are using the configuration file could fail to generate their dlt logs in system. As of time of publication, no patch exists. As a workaround, one may check the integrity of information in configuration file manually. • https://github.com/GENIVI/dlt-daemon/security/advisories/GHSA-7cqp-2hqj-mh3f • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

The daemon in GENIVI diagnostic log and trace (DLT), is vulnerable to a heap-based buffer overflow that could allow an attacker to remotely execute arbitrary code on the DLT-Daemon (versions prior to 2.18.6). El daemon de GENIVI diagnostic log and trace (DLT), es vulnerable a un desbordamiento de buffer basado en heap que podría permitir a un atacante ejecutar remotamente código arbitrario en el DLT-Daemon (versiones anteriores a la 2.18.6) • https://github.com/GENIVI/dlt-daemon/compare/v2.18.5...v2.18.6 https://github.com/GENIVI/dlt-daemon/issues/265 https://lists.debian.org/debian-lts-announce/2022/12/msg00016.html https://us-cert.cisa.gov/ics/advisories/icsa-21-147-01 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

A buffer overflow in the dlt_filter_load function in dlt_common.c from dlt-daemon through 2.18.5 (GENIVI Diagnostic Log and Trace) allows arbitrary code execution because fscanf is misused (no limit on the number of characters to be read in the format argument). Un desbordamiento de búfer en la función dlt_filter_load en el archivo dlt_common.c en dlt-daemon hasta la versión 2.18.5 (GENIVI Diagnostic Log and Trace) permite una ejecución de código arbitraria porque fscanf es usado incorrectamente (no hay límite en el número de caracteres que se leerán en un argumento de formato) • https://github.com/GENIVI/dlt-daemon/issues/274 https://github.com/GENIVI/dlt-daemon/pull/275 https://github.com/GENIVI/dlt-daemon/pull/288 https://lists.debian.org/debian-lts-announce/2022/12/msg00016.html • CWE-787: Out-of-bounds Write •