CVE-2020-10019Classic Buffer Overflow in Zephyr

Severity
7.8HIGHNVD
CNA8.1
EPSS
0.2%
top 55.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 11
Latest updateMay 24

Description

USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5zephyrproject-rtos/zephyr1.14.1unspecified+1
NVDzephyrproject/zephyr2.0.02.1.0+1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-qv66-5g67-qh59: USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size2022-05-24
CVEList
Buffer Overflow in USB DFU requested length2020-05-11
CVE-2020-10019 — Classic Buffer Overflow in Zephyr | cvebase