CVE-2024-3077
- EPSS 0.19%
- Veröffentlicht 29.03.2024 05:15:46
- Zuletzt bearbeitet 23.01.2025 19:21:44
- Quelle vulnerabilities@zephyrproject.
- Teams Watchlist Login
- Unerledigt Login
An malicious BLE device can crash BLE victim device by sending malformed gatt packet
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.19% | 0.415 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
vulnerabilities@zephyrproject.org | 6.8 | 2.1 | 4.7 |
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
|
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.