ID

VAR-202001-1829


CVE

CVE-2020-8432


TITLE

Das U-Boot Double release vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-001611

DESCRIPTION

In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis. Das U-Boot There is a double release vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Das U-Boot is an open source firmware for Power Architecture, ARM, MIPS, x86 and other processors for embedded development. Das U-Boot do_rename_gpt_parts () has two release vulnerabilities. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202405-23 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: U-Boot tools: double free vulnerability Date: May 08, 2024 Bugs: #717000 ID: 202405-23 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= A vulnerability has been discovered in U-Boot tools which can lead to execution of arbitary code. Background ========= U-Boot tools provides utiiities for working with Das U-Boot. Affected packages ================ Package Vulnerable Unaffected ------------------------- ------------ ------------ dev-embedded/u-boot-tools < 2020.04 >= 2020.04 Description ========== A vulnerability has been discovered in U-Boot tools. Please review the CVE identifier referenced below for details. Workaround ========= There is no known workaround at this time. Resolution ========= All U-Boot tools users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">\xdev-embedded/u-boot-tools-2020.04" References ========= [ 1 ] CVE-2020-8432 https://nvd.nist.gov/vuln/detail/CVE-2020-8432 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202405-23 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2024 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5

Trust: 2.25

sources: NVD: CVE-2020-8432 // JVNDB: JVNDB-2020-001611 // CNVD: CNVD-2020-15144 // PACKETSTORM: 178507

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-15144

AFFECTED PRODUCTS

vendor:opensusemodel:leapscope:eqversion:15.2

Trust: 1.0

vendor:denxmodel:u-bootscope:lteversion:2020.01

Trust: 1.0

vendor:denx engineeringmodel:u-bootscope:eqversion:2020.01

Trust: 0.8

vendor:u bootmodel:das u-bootscope:lteversion:<=2020.01

Trust: 0.6

sources: CNVD: CNVD-2020-15144 // JVNDB: JVNDB-2020-001611 // NVD: CVE-2020-8432

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-8432
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2020-001611
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2020-15144
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202001-1316
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2020-8432
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-001611
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-15144
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-8432
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-001611
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-15144 // JVNDB: JVNDB-2020-001611 // CNNVD: CNNVD-202001-1316 // NVD: CVE-2020-8432

PROBLEMTYPE DATA

problemtype:CWE-415

Trust: 1.8

problemtype:CWE-787

Trust: 1.0

sources: JVNDB: JVNDB-2020-001611 // NVD: CVE-2020-8432

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202001-1316

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202001-1316

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-001611

PATCH

title:u-booturl:https://github.com/u-boot/u-boot

Trust: 0.8

sources: JVNDB: JVNDB-2020-001611

EXTERNAL IDS

db:NVDid:CVE-2020-8432

Trust: 3.1

db:JVNDBid:JVNDB-2020-001611

Trust: 0.8

db:CNVDid:CNVD-2020-15144

Trust: 0.6

db:AUSCERTid:ESB-2020.3927

Trust: 0.6

db:AUSCERTid:ESB-2020.4035

Trust: 0.6

db:CNNVDid:CNNVD-202001-1316

Trust: 0.6

db:PACKETSTORMid:178507

Trust: 0.1

sources: CNVD: CNVD-2020-15144 // JVNDB: JVNDB-2020-001611 // PACKETSTORM: 178507 // CNNVD: CNNVD-202001-1316 // NVD: CVE-2020-8432

REFERENCES

url:http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00030.html

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-8432

Trust: 1.5

url:https://www.mail-archive.com/u-boot@lists.denx.de/msg354114.html

Trust: 1.4

url:https://www.mail-archive.com/u-boot@lists.denx.de/msg354060.html

Trust: 1.2

url:https://www.mail-archive.com/u-boot%40lists.denx.de/msg354060.html

Trust: 1.0

url:https://www.mail-archive.com/u-boot%40lists.denx.de/msg354114.html

Trust: 1.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-8432

Trust: 0.8

url:https://vigilance.fr/vulnerability/das-u-boot-use-after-free-via-do-rename-gpt-parts-33836

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.4035/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3927/

Trust: 0.6

url:https://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://security.gentoo.org/glsa/202405-23

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

sources: CNVD: CNVD-2020-15144 // JVNDB: JVNDB-2020-001611 // PACKETSTORM: 178507 // CNNVD: CNNVD-202001-1316 // NVD: CVE-2020-8432

CREDITS

Gentoo

Trust: 0.1

sources: PACKETSTORM: 178507

SOURCES

db:CNVDid:CNVD-2020-15144
db:JVNDBid:JVNDB-2020-001611
db:PACKETSTORMid:178507
db:CNNVDid:CNNVD-202001-1316
db:NVDid:CVE-2020-8432

LAST UPDATE DATE

2024-11-23T21:32:11.308000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-15144date:2020-03-03T00:00:00
db:JVNDBid:JVNDB-2020-001611date:2020-02-19T00:00:00
db:CNNVDid:CNNVD-202001-1316date:2020-11-13T00:00:00
db:NVDid:CVE-2020-8432date:2024-11-21T05:38:50.593

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-15144date:2020-03-02T00:00:00
db:JVNDBid:JVNDB-2020-001611date:2020-02-19T00:00:00
db:PACKETSTORMid:178507date:2024-05-09T15:45:13
db:CNNVDid:CNNVD-202001-1316date:2020-01-29T00:00:00
db:NVDid:CVE-2020-8432date:2020-01-29T19:15:14.260