CVE-2020-10019
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
11/05/2020
Last modified:
05/06/2020
Description
USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
4.60
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:* | 1.14.2 (excluding) | |
| cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:* | 2.0.0 (including) | 2.1.0 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10019
- https://github.com/zephyrproject-rtos/zephyr/pull/23190
- https://github.com/zephyrproject-rtos/zephyr/pull/23457
- https://github.com/zephyrproject-rtos/zephyr/pull/23460
- https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25



