Buffer Overflow Affecting azure-rtos/usbx package, versions [,6.1.11)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
1.43% (80th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-AZURERTOSUSBX-2847936
  • published25 May 2022
  • disclosed25 May 2022
  • creditszymonh

Introduced: 25 May 2022

CVE-2022-29246  (opens in a new tab)
CWE-119  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade azure-rtos/usbx to version 6.1.11 or higher.

Overview

Affected versions of this package are vulnerable to Buffer Overflow via the ux_device_class_dfu_control_request function during handling of the DFU UPLOAD command. Exploiting this vulnerability is possible when an attacker issues the UX_SLAVE_CLASS_DFU_COMMAND_UPLOAD control transfer request with wLenght larger than the buffer size (UX_SLAVE_REQUEST_CONTROL_MAX_LENGTH, 256 bytes).

CVSS Base Scores

version 3.1