Description
USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-2484 | USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions. |
References
History
No history.
Status: PUBLISHED
Assigner: zephyr
Published:
Updated: 2024-09-17T02:12:14.643Z
Reserved: 2020-03-03T00:00:00.000Z
Link: CVE-2020-10019
No data.
Status : Modified
Published: 2020-05-11T23:15:11.317
Modified: 2024-11-21T04:54:39.990
Link: CVE-2020-10019
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD