CVE-2018-18439

DENX U-Boot through 2018.09-rc1 has a remotely exploitable buffer overflow via a malicious TFTP server because TFTP traffic is mishandled. Also, local exploitation can occur via a crafted kernel image.
References
Link Resource
http://www.openwall.com/lists/oss-security/2018/11/02/2 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2018/11/02/2 Exploit Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*
cpe:2.3:a:denx:u-boot:2018.09:rc1:*:*:*:*:*:*

History

21 Nov 2024, 03:55

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2018/11/02/2 - Exploit, Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2018/11/02/2 - Exploit, Mailing List, Third Party Advisory

Information

Published : 2018-11-20 19:29

Updated : 2024-11-21 03:55


NVD link : CVE-2018-18439

Mitre link : CVE-2018-18439

CVE.ORG link : CVE-2018-18439


JSON object : View

Products Affected

denx

  • u-boot
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer