Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-7539
HistoryAug 06, 2024 - 12:00 a.m.

CVE-2024-7539

2024-08-0600:00:00
ubuntu.com
ubuntu.com
ofono
buffer overflow
code execution
vulnerability
local attackers
at+cusd commands
data validation
root context
zdi-can-23195

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

21.9%

oFono CUSD Stack-based Buffer Overflow Code Execution Vulnerability. This
vulnerability allows local attackers to execute arbitrary code on affected
installations of oFono. An attacker must first obtain the ability to
execute code on the target modem in order to exploit this vulnerability.
The specific flaw exists within the parsing of responses from AT+CUSD
commands. The issue results from the lack of proper validation of the
length of user-supplied data prior to copying it to a stack-based buffer.
An attacker can leverage this vulnerability to execute code in the context
of root. Was ZDI-CAN-23195.

Notes

Author Note
Priority reason: Remote code execution as root.

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

21.9%