mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00

The Zephyr documentation makes these links lowercase. This fixes the links so that clicking on them will go directly to the desired vulnerability, instead of the top of the document.
105 lines
3.9 KiB
JSON
105 lines
3.9 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "vulnerabilities@zephyrproject.org",
|
|
"DATE_PUBLIC": "2020-05-01T00:00:00.000Z",
|
|
"ID": "CVE-2020-10060",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "UpdateHub Might Dereference An Uninitialized Pointer"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "zephyr",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": ">=",
|
|
"version_value": "2.1.0"
|
|
},
|
|
{
|
|
"version_affected": ">=",
|
|
"version_value": "2.2.0"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "zephyrproject-rtos"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"credit": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "NCC Group for report"
|
|
}
|
|
],
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "In updatehub_probe, right after JSON parsing is complete, objects\\[1] is accessed from the output structure in two different places. If the JSON contained less than two elements, this access would reference unitialized stack memory. This could result in a crash, denial of service, or possibly an information leak. Recommend disabling updatehub until such a time as a fix can be made available. Provided the fix in CVE-2020-10059 is applied, the attack requires compromise of the server. See NCC-ZEP-030 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions."
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.0.9"
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8,
|
|
"baseSeverity": "HIGH",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "HIGH",
|
|
"scope": "CHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-37",
|
|
"name": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-37"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10060",
|
|
"name": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10060"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"defect": [
|
|
"https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-37"
|
|
],
|
|
"discovery": "EXTERNAL"
|
|
}
|
|
} |