Buffer Overflow Affecting arm-trusted-firmware package, versions *


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-ARMTRUSTEDFIRMWARE-7431099
  • published9 Jul 2024
  • disclosed8 Jul 2024

Introduced: 8 Jul 2024

CVE-2024-6563  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

There is no fixed version for Debian:13 arm-trusted-firmware.

NVD Description

Note: Versions mentioned in the description apply only to the upstream arm-trusted-firmware package and not the arm-trusted-firmware package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Renesas arm-trusted-firmware allows Local Execution of Code. This vulnerability is associated with program files https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/i... https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/io_rcar.C .

In line 313 "addr_loaded_cnt" is checked not to be "CHECK_IMAGE_AREA_CNT" (5) or larger, this check does not halt the function. Immediately after (line 317) there will be an overflow in the buffer and the value of "dst" will be written to the area immediately after the buffer, which is "addr_loaded_cnt". This will allow an attacker to freely control the value of "addr_loaded_cnt" and thus control the destination of the write immediately after (line 318). The write in line 318 will then be fully controlled by said attacker, with whichever address and whichever value ("len") they desire.

CVSS Scores

version 3.1