Buffer Overflow Affecting u-boot package, versions [0,]
Threat Intelligence
EPSS
0.04% (11th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UNMANAGED-UBOOT-7830479
- published 25 Aug 2024
- disclosed 23 Aug 2024
- credit Simon Diepold of SCHUTZWERK GmbH
Introduced: 23 Aug 2024
CVE-2024-42040 Open this link in a new tabHow to fix?
There is no fixed version for u-boot
.
Overview
Affected versions of this package are vulnerable to Buffer Overflow via the net/bootp.c
process. An attacker on the local network can leak memory ranging from four to 32 bytes stored behind the packet to the network by sending crafted DHCP responses.
##Mitigation
It is recommended that an adequate length be provided to bootp_process_vendor
to prevent the while loop from stepping outside the packet frame and check in bootp_process_vendor_field
if the copied data is still within the packet structure's range.