← Volver a CVEs
CVE-2020-10067
HIGH7.5
Descripcion
A malicious userspace application can cause a integer overflow and bypass security checks performed by system call handlers. The impact would depend on the underlying system call and can range from denial of service to information leak to memory corruption resulting in code execution within the kernel. See NCC-ZEP-005 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.
Detalles CVE
Puntuacion CVSS v3.17.5
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadHIGH
Privilegios requeridosLOW
Interaccion usuarioREQUIRED
Publicado5/11/2020
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
zephyrproject:zephyr
Debilidades (CWE)
CWE-190CWE-190
Referencias
https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10067(vulnerabilities@zephyrproject.org)
https://github.com/zephyrproject-rtos/zephyr/pull/23239(vulnerabilities@zephyrproject.org)
https://github.com/zephyrproject-rtos/zephyr/pull/23653(vulnerabilities@zephyrproject.org)
https://github.com/zephyrproject-rtos/zephyr/pull/23654(vulnerabilities@zephyrproject.org)
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27(vulnerabilities@zephyrproject.org)
https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10067(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/zephyrproject-rtos/zephyr/pull/23239(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/zephyrproject-rtos/zephyr/pull/23653(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/zephyrproject-rtos/zephyr/pull/23654(af854a3a-2127-422b-91ae-364da2661108)
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.