A vulnerability was found in MicroPython up to 1.21.0. It has been classified as critical. Affected is the function slice_indices of the file objslice.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.22.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-249180.
References
Configurations
History
21 Nov 2024, 08:45
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 7.3 |
References | () https://github.com/micropython/micropython/issues/13007 - Exploit, Issue Tracking | |
References | () https://github.com/micropython/micropython/pull/13039 - Issue Tracking | |
References | () https://github.com/micropython/micropython/pull/13039/commits/f397a3ec318f3ad05aa287764ae7cef32202380f - Patch | |
References | () https://github.com/micropython/micropython/releases/tag/v1.22.0 - Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4E2HYWCZB5R4SHY4SZZZSFDMD64N4SOZ/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D3WWY5JY4RTJE25APB4REGDUDPATG6H7/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEK46QAJOXXDZOWOIE2YACUOCZFWOBCK/ - | |
References | () https://vuldb.com/?ctiid.249180 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?id.249180 - Third Party Advisory |
06 Apr 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Apr 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Jan 2024, 14:47
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Micropython micropython
Micropython |
|
CPE | cpe:2.3:a:micropython:micropython:*:*:*:*:*:*:*:* | |
References | () https://vuldb.com/?ctiid.249180 - Permissions Required, Third Party Advisory | |
References | () https://github.com/micropython/micropython/releases/tag/v1.22.0 - Release Notes | |
References | () https://github.com/micropython/micropython/pull/13039 - Issue Tracking | |
References | () https://github.com/micropython/micropython/issues/13007 - Exploit, Issue Tracking | |
References | () https://github.com/micropython/micropython/pull/13039/commits/f397a3ec318f3ad05aa287764ae7cef32202380f - Patch | |
References | () https://vuldb.com/?id.249180 - Third Party Advisory | |
CWE | CWE-787 |
29 Dec 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-29 07:15
Updated : 2024-11-21 08:45
NVD link : CVE-2023-7158
Mitre link : CVE-2023-7158
CVE.ORG link : CVE-2023-7158
JSON object : View
Products Affected
micropython
- micropython