漏洞标题
N/A
漏洞描述信息
在MBed OS 6.16.0中发现了一个问题。其hci解析软件通过从报头中读取一个字节来动态确定某些hci包的长度。该值被认为大于或等于3,但软件并未确保这一点。提供小于3的长度值会导致稍后分配的缓冲区溢出。同时,通过提供较大的长度值可以导致另一个整数溢出,因为提供的长度值会增加几个字节以容纳应存储在那里的额外信息。此漏洞很容易被利用来发起拒绝服务攻击,但不一定足以使系统崩溃,通常也无法进一步利用,因为可被利用的缓冲区是动态分配的。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
漏洞类别
整数溢出或超界折返
漏洞标题
N/A
漏洞描述信息
An issue was discovered in MBed OS 6.16.0. Its hci parsing software dynamically determines the length of certain hci packets by reading a byte from its header. This value is assumed to be greater than or equal to 3, but the software doesn't ensure that this is the case. Supplying a length less than 3 leads to a buffer overflow in a buffer that is allocated later. It is simultaneously possible to cause another integer overflow by supplying large length values because the provided length value is increased by a few bytes to account for additional information that is supposed to be stored there. This bug is trivial to exploit for a denial of service but is not certain to suffice to bring the system down and can generally not be exploited further because the exploitable buffer is dynamically allocated.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
ARM Mbed OS 安全漏洞
漏洞描述信息
ARM Mbed OS是英国ARM公司的一套专用于物联网的开源嵌入式操作系统。 ARM Mbed OS 6.16.0版本存在安全漏洞,该漏洞源于其HCI解析软件在读取数据包头部的一个字节以确定数据包长度时,当提供的长度不同于预设值会导致缓冲区溢出。
CVSS信息
N/A
漏洞类别
其他