Buffer Overflow and Integer Overflow Vulnerability in MBed OS by Arm
CVE-2024-48982
7.5HIGH
Summary
In MBed OS version 6.16.0, a vulnerability exists in the hci parsing software that improperly assumes the length of certain hci packets will always be three bytes or greater. When a packet length less than three is supplied, it triggers a buffer overflow due to insufficient validation of the packet length. Additionally, the vulnerability allows for an integer overflow by supplying excessively large length values, as the system increases the received length for accounting additional data. This flaw can be easily exploited for denial of service purposes, although it does not definitively lead to a complete system failure. Furthermore, the dynamically allocated buffer limits the extent of potential exploitation.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published