René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

119 lines
4.7 KiB
JSON

{
"id": "CVE-2020-27483",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-11-16T21:15:13.300",
"lastModified": "2020-12-02T14:55:09.437",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Garmin Forerunner 235 before 8.20 is affected by: Array index error. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter trusts the offset provided for the stack value duplication instruction, DUP. The offset is unchecked and memory prior to the start of the execution stack can be read and treated as a TVM object. A successful exploit could use the vulnerability to leak runtime information such as the heap handle or pointer for a number of TVM context variables. Some reachable values may be controlled enough to forge a TVM object on the stack, leading to possible remote code execution."
},
{
"lang": "es",
"value": "Garmin Forerunner 235 versiones anteriores a 8.20, est\u00e1 afectado por: un Error de \u00cdndice de Matriz. El componente es: ConnectIQ TVM. El vector de ataque es: Para explotar la vulnerabilidad, el atacante debe cargar una aplicaci\u00f3n de ConnectIQ maliciosa en la tienda ConnectIQ. El int\u00e9rprete del programa ConnectIQ conf\u00eda en el desplazamiento proporcionado para la instrucci\u00f3n de duplicaci\u00f3n del valor de pila, DUP. El desplazamiento no est\u00e1 marcado y la memoria antes del inicio de la pila de ejecuci\u00f3n puede ser le\u00edda y tratada como un objeto TVM. Una explotaci\u00f3n con \u00e9xito podr\u00eda usar la vulnerabilidad para filtrar informaci\u00f3n de tiempo de ejecuci\u00f3n, como el manejador de pila o el puntero para una serie de variables del contexto de TVM. Algunos valores alcanzables pueden controlarse lo suficiente para falsificar un objeto TVM en la pila, conllevando a una posible ejecuci\u00f3n de c\u00f3digo remota"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-129"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:garmin:forerunner_235_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.90",
"versionEndExcluding": "8.20",
"matchCriteriaId": "6043DF86-0FC7-4F8D-A1F4-A8A79BF90099"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:garmin:forerunner_235:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3387D0DB-AB79-4860-B741-CE78FE79139D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0007.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}