Zephyrproject

Zephyr

119 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 5.82%
  • Veröffentlicht 05.06.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:54:43

An off-by-one error in the Zephyr project MQTT packet length decoder can result in memory corruption and possible remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.

  • EPSS 1.87%
  • Veröffentlicht 05.06.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:54:43

A remote adversary with the ability to send arbitrary CoAP packets to be parsed by Zephyr is able to cause a denial of service. This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.

  • EPSS 0.08%
  • Veröffentlicht 05.06.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:54:44

In the Zephyr project Bluetooth subsystem, certain duplicate and back-to-back packets can cause incorrect behavior, resulting in a denial of service. This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions, and version 1.14.0 a...

  • EPSS 6.47%
  • Veröffentlicht 05.06.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:54:44

In the Zephyr Project MQTT code, improper bounds checking can result in memory corruption and possibly remote code execution. NCC-ZEP-031 This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions.

  • EPSS 2.97%
  • Veröffentlicht 11.05.2020 23:15:12
  • Zuletzt bearbeitet 21.11.2024 04:54:43

In updatehub_probe, right after JSON parsing is complete, objects\[1] is accessed from the output structure in two different places. If the JSON contained less than two elements, this access would reference unitialized stack memory. This could result...

  • EPSS 0.06%
  • Veröffentlicht 11.05.2020 23:15:12
  • Zuletzt bearbeitet 21.11.2024 04:54:44

A malicious userspace application can cause a integer overflow and bypass security checks performed by system call handlers. The impact would depend on the underlying system call and can range from denial of service to information leak to memory corr...

  • EPSS 0.22%
  • Veröffentlicht 11.05.2020 23:15:11
  • Zuletzt bearbeitet 21.11.2024 04:54:39

USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zep...

  • EPSS 0.08%
  • Veröffentlicht 11.05.2020 23:15:11
  • Zuletzt bearbeitet 21.11.2024 04:54:40

Out-of-bounds Write in the USB Mass Storage memoryWrite handler with unaligned Sizes See NCC-ZEP-024, NCC-ZEP-025, NCC-ZEP-026 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.

  • EPSS 1.7%
  • Veröffentlicht 11.05.2020 23:15:11
  • Zuletzt bearbeitet 21.11.2024 04:54:40

A malformed JSON payload that is received from an UpdateHub server may trigger memory corruption in the Zephyr OS. This could result in a denial of service in the best case, or code execution in the worst case. See NCC-NCC-016 This issue affects: zep...

  • EPSS 0.38%
  • Veröffentlicht 11.05.2020 23:15:11
  • Zuletzt bearbeitet 21.11.2024 04:54:40

The shell subsystem contains a buffer overflow, whereby an adversary with physical access to the device is able to cause a memory corruption, resulting in denial of service or possibly code execution within the Zephyr kernel. See NCC-NCC-019 This iss...