Lucene search

K
githubGitHub Advisory DatabaseGHSA-VH3X-525M-JP4R
HistorySep 17, 2024 - 9:30 p.m.

heap-buffer-overflow in MicroPython

2024-09-1721:30:32
CWE-122
CWE-787
GitHub Advisory Database
github.com
2
vulnerability
critical rating
heap-based buffer overflow
remote attack
public exploit
patch 908ab1ceca15ee6fd0ef82ca4cba770a3ec41894
software
objint component
zero conversion

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS4

6.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/SC:N/VI:L/SI:N/VA:L/SA:N

AI Score

6.9

Confidence

Low

A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected by this issue is the function mpz_as_bytes of the file py/objint.c. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 908ab1ceca15ee6fd0ef82ca4cba770a3ec41894. It is recommended to apply a patch to fix this issue. In micropython objint component, converting zero from int to bytes leads to heap buffer-overflow-write at mpz_as_bytes.

Affected configurations

Vulners
Node
micropythonmicropython-osRange0.8
OR
micropythonmicropython-ioRange0.1
OR
micropythonmicropython-copyRange3.3.3.post3
VendorProductVersionCPE
micropythonmicropython-os*cpe:2.3:a:micropython:micropython-os:*:*:*:*:*:*:*:*
micropythonmicropython-io*cpe:2.3:a:micropython:micropython-io:*:*:*:*:*:*:*:*
micropythonmicropython-copy*cpe:2.3:a:micropython:micropython-copy:*:*:*:*:*:*:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS4

6.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/SC:N/VI:L/SI:N/VA:L/SA:N

AI Score

6.9

Confidence

Low

Related for GHSA-VH3X-525M-JP4R