Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-7538
HistoryAug 06, 2024 - 12:00 a.m.

CVE-2024-7538

2024-08-0600:00:00
ubuntu.com
ubuntu.com
ofono
buffer overflow
code execution
local attackers
at commands
validation
user-supplied data
root context
zdi-can-23190
remote code execution

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

21.9%

oFono CUSD AT Command Stack-based Buffer Overflow Code Execution
Vulnerability. This vulnerability allows local attackers to execute
arbitrary code on affected installations of oFono. An attacker must first
obtain the ability to execute code on the target modem in order to exploit
this vulnerability.
The specific flaw exists within the parsing of responses from AT Commands.
The issue results from the lack of proper validation of the length of
user-supplied data prior to copying it to a stack-based buffer. An attacker
can leverage this vulnerability to execute code in the context of root. Was
ZDI-CAN-23190.

Notes

Author Note
Priority reason: Remote code execution as root.

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

21.9%