SB2024032052 - Multiple vulnerabilities in RT-Thread
Published: March 20, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Heap-based buffer overflow (CVE-ID: CVE-2024-24334)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in dfs_v2 dfs_file. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Buffer overflow (CVE-ID: CVE-2024-24335)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in dfs_v2 romfs filesystem. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Heap-based buffer overflow (CVE-ID: CVE-2024-25388)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in wlan driver. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Security features bypass (CVE-ID: CVE-2024-25389)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to weak random source in RT-Thread rt_random driver. A remote attacker can break encryption on the target system.
5) Heap-based buffer overflow (CVE-ID: CVE-2024-25390)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in finsh. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
6) Stack-based buffer overflow (CVE-ID: CVE-2024-25391)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in IPC. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
7) Out-of-bounds write (CVE-ID: CVE-2024-25392)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in var_export utility. A remote attacker can trigger an out-of-bounds write and execute arbitrary code on the target system.
8) Stack-based buffer overflow (CVE-ID: CVE-2024-25393)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in AT server. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
9) Buffer overflow (CVE-ID: CVE-2024-25394)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in ymodem utility. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
10) Buffer overflow (CVE-ID: CVE-2024-25395)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in rt-link utility. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- https://seclists.org/fulldisclosure/2024/Mar/28
- https://github.com/RT-Thread/rt-thread/issues/8282
- https://github.com/RT-Thread/rt-thread/issues/8271
- https://github.com/RT-Thread/rt-thread/issues/8285
- https://github.com/RT-Thread/rt-thread/issues/8283
- https://github.com/RT-Thread/rt-thread/issues/8286
- https://github.com/RT-Thread/rt-thread/issues/8287
- https://github.com/RT-Thread/rt-thread/issues/8290
- https://github.com/RT-Thread/rt-thread/issues/8288
- https://github.com/RT-Thread/rt-thread/issues/8291
- https://github.com/RT-Thread/rt-thread/issues/8289