CVE-2020-10023
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
11/05/2020
Last modified:
05/06/2020
Description
The shell subsystem contains a buffer overflow, whereby an adversary with physical access to the device is able to cause a memory corruption, resulting in denial of service or possibly code execution within the Zephyr kernel. See NCC-NCC-019 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.
Impact
Base Score 3.x
6.80
Severity 3.x
MEDIUM
Base Score 2.0
4.60
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:zephyrproject:zephyr:1.14.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:zephyrproject:zephyr:2.1.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10023
- https://github.com/zephyrproject-rtos/zephyr/pull/23304
- https://github.com/zephyrproject-rtos/zephyr/pull/23646
- https://github.com/zephyrproject-rtos/zephyr/pull/23649
- https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-29



