{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2024-7490", "ASSIGNER": "psirt@microchip.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "** UNSUPPPORTED WHEN ASSIGNED ** Improper Input Validation vulnerability in Microchip Techology Advanced Software Framework example DHCP server can cause remote code execution through a buffer overflow.\n This vulnerability is associated with program files tinydhcpserver.C and program routines lwip_dhcp_find_option.\n\nThis issue affects Advanced Software Framework: through 3.52.0.2574.\n\n\nASF is no longer being supported. Apply provided workaround or migrate to an actively maintained framework." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", "cweId": "CWE-120" } ] }, { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation", "cweId": "CWE-20" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Microchip Techology", "product": { "product_data": [ { "product_name": "Advanced Software Framework", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "versions": [ { "lessThanOrEqual": "3.52.0.2574", "status": "affected", "version": "0", "versionType": "semver" } ], "defaultStatus": "affected" } } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://www.microchip.com/en-us/tools-resources/develop/libraries/advanced-software-framework", "refsource": "MISC", "name": "https://www.microchip.com/en-us/tools-resources/develop/libraries/advanced-software-framework" } ] }, "generator": { "engine": "Vulnogram 0.2.0" }, "source": { "advisory": "PSIRT-23", "discovery": "EXTERNAL" }, "configuration": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use of the lwip stack embedded in ASF, and using the example DHCP server provided.
" } ], "value": "Use of the lwip stack embedded in ASF, and using the example DHCP server provided." } ], "work_around": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "
\nThe issue can be mitigated by adding a check to the size variable after the call [1] to pbuf_get_at on line 127 [1].\n If the size variable is not 4, then the function should cease \nprocessing and return. The lwip_dhcp_find_option function is only used \nto find this one option.

\n

[1] https://github.com/alfred-ai/microchip-asf/blob/bf5205e36a265b867d531647ffbf2de5e287853a/thirdparty/lwip/lwip-tinyservices/tinydhcpserver.c#L127

\n\n
" } ], "value": "The issue can be mitigated by adding a check to the size variable after the call [1] to pbuf_get_at on line 127 [1].\n If the size variable is not 4, then the function should cease \nprocessing and return. The lwip_dhcp_find_option function is only used \nto find this one option. \n\n\n\n\n\n\n [1] https://github.com/alfred-ai/microchip-asf/blob/bf5205e36a265b867d531647ffbf2de5e287853a/thirdparty/lwip/lwip-tinyservices/tinydhcpserver.c#L127" } ], "solution": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "ASF is no longer being supported. Apply provided workaround or migrate to an actively maintained framework.
" } ], "value": "ASF is no longer being supported. Apply provided workaround or migrate to an actively maintained framework." } ], "credits": [ { "lang": "en", "value": "element55" } ] }