2024-12-08 03:06:42 +00:00

123 lines
3.8 KiB
JSON

{
"id": "CVE-2022-2347",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2022-09-23T13:15:10.133",
"lastModified": "2024-11-21T07:00:49.073",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There exists an unchecked length field in UBoot. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and it does not verify that the transfer direction corresponds to the specified command. Consequently, if a physical attacker crafts a USB DFU download setup packet with a `wLength` greater than 4096 bytes, they can write beyond the heap-allocated request buffer."
},
{
"lang": "es",
"value": "Se presenta un campo de longitud no comprobado en UBoot. La implementaci\u00f3n de U-Boot DFU no vincula el campo de longitud en los paquetes de configuraci\u00f3n de descarga de USB DFU, y no verifica que la direcci\u00f3n de transferencia sea correspondida con el comando especificado. En consecuencia, si un atacante f\u00edsico dise\u00f1a un paquete de configuraci\u00f3n de descarga USB DFU con una \"wLength\" superior a 4096 bytes, puede escribir m\u00e1s all\u00e1 del b\u00fafer de petici\u00f3n asignado a la pila."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@google.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve-coordination@google.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2012.10",
"versionEndIncluding": "2022.07",
"matchCriteriaId": "DF635F28-C38A-4034-A23B-A7EF640E6EB0"
}
]
}
]
}
],
"references": [
{
"url": "https://seclists.org/oss-sec/2022/q3/41",
"source": "cve-coordination@google.com",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://seclists.org/oss-sec/2022/q3/41",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
}
]
}