The DEF CON 27 badge allows remote attackers to exploit a buffer overflow by sending an oversized packet via the NFMI (Near Field Magnetic Induction) protocol.
References
Link | Resource |
---|---|
https://defcon.org/html/defcon-29/dc-29-speakers.html#kintigh | Exploit Third Party Advisory |
https://github.com/skintigh/defcon27_badge_sdr | |
https://defcon.org/html/defcon-29/dc-29-speakers.html#kintigh | Exploit Third Party Advisory |
https://github.com/skintigh/defcon27_badge_sdr |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://defcon.org/html/defcon-29/dc-29-speakers.html#kintigh - Exploit, Third Party Advisory | |
References | () https://github.com/skintigh/defcon27_badge_sdr - |
21 Nov 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2021-08-04 18:15
Updated : 2024-11-21 06:16
NVD link : CVE-2021-38111
Mitre link : CVE-2021-38111
CVE.ORG link : CVE-2021-38111
JSON object : View
Products Affected
defcon
- def_con_27_firmware
- def_con_27
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')