CVE-2024-2452

In Eclipse ThreadX NetX Duo before 6.4.0, if an attacker can control parameters of __portable_aligned_alloc() could cause an integer wrap-around and an allocation smaller than expected. This could cause subsequent heap buffer overflows.
Configurations

No configuration.

History

21 Nov 2024, 09:09

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2024/May/35 - () http://seclists.org/fulldisclosure/2024/May/35 -
References () http://www.openwall.com/lists/oss-security/2024/05/28/1 - () http://www.openwall.com/lists/oss-security/2024/05/28/1 -
References () https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-h963-7vhw-8rpx - () https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-h963-7vhw-8rpx -

10 Jun 2024, 19:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/05/28/1 -

10 Jun 2024, 18:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/May/35 -
Summary
  • (es) En Eclipse ThreadX NetX Duo anterior a 6.4.0, si un atacante puede controlar los parámetros de __portable_aligned_alloc() podría provocar una envoltura de enteros y una asignación menor de lo esperado. Esto podría provocar desbordamientos de búfer de almacenamiento dinámico.

26 Mar 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-26 16:15

Updated : 2024-11-21 09:09


NVD link : CVE-2024-2452

Mitre link : CVE-2024-2452

CVE.ORG link : CVE-2024-2452


JSON object : View

Products Affected

No product.

CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-190

Integer Overflow or Wraparound