A buffer overflow in the dlt_filter_load function in dlt_common.c from dlt-daemon through 2.18.5 (GENIVI Diagnostic Log and Trace) allows arbitrary code execution because fscanf is misused (no limit on the number of characters to be read in the format argument).
References
Link | Resource |
---|---|
https://github.com/GENIVI/dlt-daemon/issues/274 | Exploit Patch Third Party Advisory |
https://github.com/GENIVI/dlt-daemon/pull/275 | Patch Third Party Advisory |
https://github.com/GENIVI/dlt-daemon/pull/288 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00016.html | Mailing List Third Party Advisory |
https://github.com/GENIVI/dlt-daemon/issues/274 | Exploit Patch Third Party Advisory |
https://github.com/GENIVI/dlt-daemon/pull/275 | Patch Third Party Advisory |
https://github.com/GENIVI/dlt-daemon/pull/288 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00016.html | Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 05:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/GENIVI/dlt-daemon/issues/274 - Exploit, Patch, Third Party Advisory | |
References | () https://github.com/GENIVI/dlt-daemon/pull/275 - Patch, Third Party Advisory | |
References | () https://github.com/GENIVI/dlt-daemon/pull/288 - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/12/msg00016.html - Mailing List, Third Party Advisory |
Information
Published : 2020-11-30 19:15
Updated : 2024-11-21 05:23
NVD link : CVE-2020-29394
Mitre link : CVE-2020-29394
CVE.ORG link : CVE-2020-29394
JSON object : View
Products Affected
genivi
- diagnostic_log_and_trace
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write