// For flags

CVE-2020-12883

 

Severity Score

9.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Buffer over-reads were discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses CoAP input linearly using a while loop. Once an option is parsed in a loop, the current point (*packet_data_pptr) is increased correspondingly. The pointer is restricted by the size of the received buffer, as well as by the option delta and option length bytes. The actual input packet length is not verified against the number of bytes read when processing the option extended delta and the option extended length. Moreover, the calculation of the message_left variable, in the case of non-extended option deltas, is incorrect and indicates more data left for processing than provided in the function input. All of these lead to heap-based or stack-based memory location read access that is outside of the intended boundary of the buffer. Depending on the platform-specific memory management mechanisms, it can lead to processing of unintended inputs or system memory access violation errors.

Se detectaron lecturas excesivas del búfer en la biblioteca CoAP en Arm Mbed OS versión 5.15.3. El analizador CoAP es responsable de analizar los paquetes CoAP recibidos. La función sn_coap_parser_options_parse() analiza la entrada CoAP linealmente usando un bucle while. Una vez que se analiza una opción en un bucle, el punto actual (*packet_data_pptr) se incrementa correspondientemente. El puntero es restringido por el tamaño del búfer recibido, así como por los bytes option delta y option length. La longitud real del paquete de entrada no es comprobada con el número de bytes leídos cuando se procesa la opción delta extendida y la opción longitud extendida. Además, el cálculo de la variable message_left, en el caso de deltas de opción no extendida, es incorrecto e indica que quedan más datos para procesar que los proporcionados en la entrada de la función. Todo esto conlleva a un acceso de lectura de ubicación de memoria en la región heap o stack que está fuera del límite previsto del búfer. Dependiendo de los mecanismos de administración de memoria específicos de la plataforma, puede conllevar al procesamiento de entradas no deseadas o errores de violación de acceso de la memoria de sistema

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-05-15 CVE Reserved
  • 2020-06-18 CVE Published
  • 2024-04-22 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-125: Out-of-bounds Read
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Arm
Search vendor "Arm"
Mbed Os
Search vendor "Arm" for product "Mbed Os"
5.15.3
Search vendor "Arm" for product "Mbed Os" and version "5.15.3"
-
Affected