Integer Overflow or Wraparound Affecting armmbed/mbed-os package, versions [0,]


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
2.3% (90th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ARMMBEDMBEDOS-2366248
  • published26 Jan 2022
  • disclosed5 Nov 2019
  • creditUnknown

Introduced: 5 Nov 2019

CVE-2019-17211  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

There is no fixed version for armmbed/mbed-os.

Overview

Affected versions of this package are vulnerable to Integer Overflow or Wraparound. An integer overflow was discovered in the CoAP library in Arm Mbed OS 5.14.0. The function sn_coap_builder_calc_needed_packet_data_size_2() is used to calculate the required memory for the CoAP message from the sn_coap_hdr_s data structure. Both returned_byte_count and src_coap_msg_ptr->payload_len are of type uint16_t. When added together, the result returned_byte_count can wrap around the maximum uint16_t value. As a result, insufficient buffer space is allocated for the corresponding CoAP message.

CVSS Base Scores

version 3.1