#VU34391 Buffer overflow in zephyr


Published: 2020-05-12 | Updated: 2020-08-08

Vulnerability identifier: #VU34391

Vulnerability risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-10023

CWE-ID: CWE-120

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
zephyr
Other software / Other software solutions

Vendor: rutantan

Description

The vulnerability allows a local non-authenticated attacker to execute arbitrary code.

The shell subsystem contains a buffer overflow, whereby an adversary with physical access to the device is able to cause a memory corruption, resulting in denial of service or possibly code execution within the Zephyr kernel. See NCC-NCC-019 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.

Mitigation
Install update from vendor's website.

Vulnerable software versions

zephyr: 1.14.1 - 2.1.0


External links
http://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10023
http://github.com/zephyrproject-rtos/zephyr/pull/23304
http://github.com/zephyrproject-rtos/zephyr/pull/23646
http://github.com/zephyrproject-rtos/zephyr/pull/23649
http://zephyrprojectsec.atlassian.net/browse/ZEPSEC-29


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability