Update CVE-2021-42553.json

This commit is contained in:
ncsc-ch-vuln-mgmt 2023-03-07 13:15:12 +01:00 committed by GitHub
parent 8393c23899
commit 79195d2507
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -16,8 +16,9 @@
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "all",
"version_value": "all"
"version_value": "3.5.1"
}
]
}
@ -42,7 +43,7 @@
"description_data": [
{
"lang": "eng",
"value": "A buffer overflow vulnerability in stm32_mw_usb_host of STMicroelectronics allows an attacker to execute arbitrary code when the descriptor contains more endpoints than USBH_MAX_NUM_ENDPOINTS. The library is typically integrated when using a RTOS such as FreeRTOS on STM32 MCUs."
"value": "A buffer overflow vulnerability in stm32_mw_usb_host of STMicroelectronics in versions before 3.5.1 allows an attacker to execute arbitrary code when the descriptor contains more endpoints than USBH_MAX_NUM_ENDPOINTS. The library is typically integrated when using a RTOS such as FreeRTOS on STM32 MCUs."
}
]
},
@ -83,10 +84,15 @@
"name": "https://github.com/STMicroelectronics/stm32_mw_usb_host/pull/4",
"refsource": "CONFIRM",
"url": "https://github.com/STMicroelectronics/stm32_mw_usb_host/pull/4"
},
{
"name": "https://github.com/STMicroelectronics/stm32_mw_usb_host",
"refsource": "MISC",
"url": "https://github.com/STMicroelectronics/stm32_mw_usb_host"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
}
}