CVE-2022-2347

There exists an unchecked length field in UBoot. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and it does not verify that the transfer direction corresponds to the specified command. Consequently, if a physical attacker crafts a USB DFU download setup packet with a `wLength` greater than 4096 bytes, they can write beyond the heap-allocated request buffer.
References
Link Resource
https://seclists.org/oss-sec/2022/q3/41 Exploit Mailing List Third Party Advisory
https://seclists.org/oss-sec/2022/q3/41 Exploit Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:00

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.1
v2 : unknown
v3 : 7.7
References () https://seclists.org/oss-sec/2022/q3/41 - Exploit, Mailing List, Third Party Advisory () https://seclists.org/oss-sec/2022/q3/41 - Exploit, Mailing List, Third Party Advisory

Information

Published : 2022-09-23 13:15

Updated : 2024-11-21 07:00


NVD link : CVE-2022-2347

Mitre link : CVE-2022-2347

CVE.ORG link : CVE-2022-2347


JSON object : View

Products Affected

denx

  • u-boot
CWE
CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write