Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-29223
HistoryMay 24, 2022 - 2:25 p.m.

CVE-2022-29223 Buffer overflow on HUB descriptor in Azure RTOS USBX

2022-05-2414:25:10
CWE-120
GitHub_M
www.cve.org
1
azure rtos usbx
buffer overflow
usb host stack
hub descriptor
cve-2022-29223
update
validation
version 6.1.10

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

9.8

Confidence

High

EPSS

0.003

Percentile

69.7%

Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack. In versions prior to 6.1.10, an attacker can cause a buffer overflow by providing the Azure RTOS USBX host stack a HUB descriptor with bNbPorts set to a value greater than UX_MAX_TT which defaults to 8. For a bNbPorts value of 255, the implementation of ux_host_class_hub_descriptor_get function will modify the contents of hub -> ux_host_class_hub_device -> ux_device_hub_tt array violating the end boundary by 255 - UX_MAX_TT items. The USB host stack needs to validate the number of ports reported by the hub, and if the value is larger than UX_MAX_TT, USB stack needs to reject the request. This fix has been included in USBX release 6.1.10.

CNA Affected

[
  {
    "product": "usbx",
    "vendor": "azure-rtos",
    "versions": [
      {
        "status": "affected",
        "version": "< 6.1.10"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

9.8

Confidence

High

EPSS

0.003

Percentile

69.7%

Related for CVELIST:CVE-2022-29223