René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

119 lines
4.7 KiB
JSON

{
"id": "CVE-2020-27485",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-11-16T21:15:13.440",
"lastModified": "2020-12-02T15:02:28.557",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Garmin Forerunner 235 before 8.20 is affected by: Array index error. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter fails to check the index provided when accessing the local variable in the LGETV and LPUTV instructions. This provides the ability to both read and write memory outside the bounds of the TVM context allocation. It can be leveraged to construct a use-after-free scenario, leading to a constrained read/write primitive across the entire MAX32630 address space. A successful exploit would allow a ConnectIQ app store application to escape and perform activities outside the restricted application execution environment."
},
{
"lang": "es",
"value": "Garmin Forerunner 235 versiones anteriores a 8.20, est\u00e1 afectado por: un Error de \u00edndice de Matriz. El componente es: ConnectIQ TVM. El vector de ataque es: Para explotar la vulnerabilidad, el atacante debe cargar una aplicaci\u00f3n de ConnectIQ maliciosa en la tienda ConnectIQ. El int\u00e9rprete del programa ConnectIQ presenta un fallo al comprobar el \u00edndice proporcionado cuando se accede a la variable local en las instrucciones LGETV y LPUTV. Esto proporciona la capacidad de leer y escribir la memoria fuera de los l\u00edmites de la asignaci\u00f3n del contexto TVM. Puede ser aprovechada para construir un escenario de uso de la memoria previamente liberada, conllevando a una primitiva de lectura y escritura restringida en todo el espacio de direcciones MAX32630. Una explotaci\u00f3n con \u00e9xito permitir\u00eda a una aplicaci\u00f3n de la tienda de aplicaciones ConnectIQ escapar y llevar a cabo actividades fuera del entorno de ejecuci\u00f3n de aplicaciones restringido"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-129"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:garmin:forerunner_235_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.90",
"versionEndExcluding": "8.20",
"matchCriteriaId": "6043DF86-0FC7-4F8D-A1F4-A8A79BF90099"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:garmin:forerunner_235:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3387D0DB-AB79-4860-B741-CE78FE79139D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0005.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}