The Nintendo NetworkBuffer class, as used in Animal Crossing: New Horizons before 2.0.6 and other products, allows remote attackers to execute arbitrary code via a large UDP packet that causes a buffer overflow, aka ENLBufferPwn. The victim must join a game session with the attacker. Other affected products include Mario Kart 7 before 1.2, Mario Kart 8, Mario Kart 8 Deluxe before 2.1.0, ARMS before 5.4.1, Splatoon, Splatoon 2 before 5.5.1, Splatoon 3 before late 2022, Super Mario Maker 2 before 3.0.2, and Nintendo Switch Sports before late 2022.
References
Link | Resource |
---|---|
https://github.com/PabloMK7/ENLBufferPwn | Exploit Third Party Advisory |
https://github.com/PabloMK7/ENLBufferPwn | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/PabloMK7/ENLBufferPwn - Exploit, Third Party Advisory |
Information
Published : 2022-12-24 23:15
Updated : 2024-11-21 07:32
NVD link : CVE-2022-47949
Mitre link : CVE-2022-47949
CVE.ORG link : CVE-2022-47949
JSON object : View
Products Affected
nintendo
- splatoon_3
- splatoon_2
- animal_crossing\
- splatoon
- mario_kart_8
- super_mario_maker_2
- arms
- switch_sports
- mario_kart_7
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')