SB2020032504 - Multiple vulnerabilities in OpenWrt/LEDE
Published: March 25, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Improper Neutralization of Special Elements in Output Used by a Downstream Component (CVE-ID: CVE-2020-7982)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists in the OPKG package manager due to the way it performs integrity checking of downloaded packages using the SHA-256 checksums embedded in the signed repository index. A remote attacker can perform a man-in-the-middle attack, inject arbitrary package payloads and execute arbitrary code on the target system.
2) Out-of-bounds write (CVE-ID: CVE-2020-7248)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in libubox library. A remote attacker can provide a specially crafted binary blob or JSON input to "blobmsg_format_json", trigger out-of-bounds write and execute arbitrary code on the target system.
Remediation
Install update from vendor's website.
References
- https://github.com/openwrt/openwrt/commits/master
- https://openwrt.org/advisory/2020-01-31-1
- https://thehackernews.com/2020/03/openwrt-rce-vulnerability.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Cyber+Security+Blog%29
- https://openwrt.org/advisory/2020-01-31-2