Lucene search

K
cveGitHub_MCVE-2022-39274
HistoryOct 06, 2022 - 6:16 p.m.

CVE-2022-39274

2022-10-0618:16:16
CWE-120
CWE-193
GitHub_M
web.nvd.nist.gov
29
5
loramac-node
cve-2022-39274
buffer overflow
out-of-bounds write
security vulnerability
patch e851b079
nvd

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.004

Percentile

74.1%

LoRaMac-node is a reference implementation and documentation of a LoRa network node. Versions of LoRaMac-node prior to 4.7.0 are vulnerable to a buffer overflow. Improper size validation of the incoming radio frames can lead to an 65280-byte out-of-bounds write. The function ProcessRadioRxDone implicitly expects incoming radio frames to have at least a payload of one byte or more. An empty payload leads to a 1-byte out-of-bounds read of user controlled content when the payload buffer is reused. This allows an attacker to craft a FRAME_TYPE_PROPRIETARY frame with size -1 which results in an 65280-byte out-of-bounds memcopy likely with partially controlled attacker data. Corrupting a large part if the data section is likely to cause a DoS. If the large out-of-bounds write does not immediately crash the attacker may gain control over the execution due to now controlling large parts of the data section. Users are advised to upgrade either by updating their package or by manually applying the patch commit e851b079.

Affected configurations

Nvd
Vulners
Node
semtechloramac-nodeRange<4.7.0
VendorProductVersionCPE
semtechloramac-node*cpe:2.3:a:semtech:loramac-node:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Lora-net",
    "product": "LoRaMac-node",
    "versions": [
      {
        "version": "< 4.7.0",
        "status": "affected"
      }
    ]
  }
]

Social References

More

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.004

Percentile

74.1%

Related for CVE-2022-39274