{ "id": "CVE-2020-10019", "sourceIdentifier": "vulnerabilities@zephyrproject.org", "published": "2020-05-11T23:15:11.317", "lastModified": "2024-11-21T04:54:39.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions." }, { "lang": "es", "value": "USB DFU presenta un potencial desbordamiento del b\u00fafer donde la longitud requerida (wLength) no es comparada con el tama\u00f1o del b\u00fafer. Esto podr\u00eda ser usado por un host USB malicioso para explotar el desbordamiento del b\u00fafer. Consulte NCC-ZEP-002. Este problema afecta a: zephyrproject-rtos zephyr versi\u00f3n 1.14.1 y versiones posteriores. Versi\u00f3n 2.1.0 y versiones posteriores." } ], "metrics": { "cvssMetricV31": [ { "source": "vulnerabilities@zephyrproject.org", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "baseScore": 8.1, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.4, "impactScore": 6.0 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "vulnerabilities@zephyrproject.org", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-120" } ] }, { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-120" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.14.2", "matchCriteriaId": "548B8018-2D83-4F2E-B78D-4E487773478B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.0.0", "versionEndIncluding": "2.1.0", "matchCriteriaId": "97F3CD96-C804-457B-8A4C-08147DEB7CC0" } ] } ] } ], "references": [ { "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10019", "source": "vulnerabilities@zephyrproject.org" }, { "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23190", "source": "vulnerabilities@zephyrproject.org", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23457", "source": "vulnerabilities@zephyrproject.org", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23460", "source": "vulnerabilities@zephyrproject.org", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25", "source": "vulnerabilities@zephyrproject.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10019", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23190", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23457", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23460", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] } ] }