ID

VAR-202411-1476


CVE

CVE-2024-48986


TITLE

ARM Ltd.  of  Mbed OS  Classic buffer overflow vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2024-013348

DESCRIPTION

An issue was discovered in MBed OS 6.16.0. Its hci parsing software dynamically determines the length of certain hci packets by reading a byte from its header. Certain events cause a callback, the logic for which allocates a buffer (the length of which is determined by looking up the event type in a table). The subsequent write operation, however, copies the amount of data specified in the packet header, which may lead to a buffer overflow. This bug is trivial to exploit for a denial of service but is not certain to suffice to bring the system down and can generally not be exploited further because the exploitable buffer is dynamically allocated. ARM Ltd. of Mbed OS Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2024-48986 // JVNDB: JVNDB-2024-013348

AFFECTED PRODUCTS

vendor:armmodel:mbedscope:eqversion:6.16.0

Trust: 1.0

vendor:armmodel:mbed osscope:eqversion: -

Trust: 0.8

vendor:armmodel:mbed osscope: - version: -

Trust: 0.8

vendor:armmodel:mbed osscope:eqversion:6.16.0

Trust: 0.8

sources: JVNDB: JVNDB-2024-013348 // NVD: CVE-2024-48986

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2024-48986
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-48986
value: HIGH

Trust: 1.0

NVD: CVE-2024-48986
value: HIGH

Trust: 0.8

nvd@nist.gov: CVE-2024-48986
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2024-48986
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2024-013348 // NVD: CVE-2024-48986 // NVD: CVE-2024-48986

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-013348 // NVD: CVE-2024-48986

EXTERNAL IDS

db:NVDid:CVE-2024-48986

Trust: 2.6

db:JVNDBid:JVNDB-2024-013348

Trust: 0.8

sources: JVNDB: JVNDB-2024-013348 // NVD: CVE-2024-48986

REFERENCES

url:https://github.com/mbed-ce/mbed-os/blob/54e8693ef4ff7e025018094f290a1d5cf380941f/connectivity/feature_ble/libraries/cordio_stack/ble-host/sources/hci/dual_chip/hci_evt.c#l3018

Trust: 1.8

url:https://github.com/mbed-ce/mbed-os/pull/385

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-48986

Trust: 0.8

sources: JVNDB: JVNDB-2024-013348 // NVD: CVE-2024-48986

SOURCES

db:JVNDBid:JVNDB-2024-013348
db:NVDid:CVE-2024-48986

LAST UPDATE DATE

2024-11-27T23:00:24.707000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2024-013348date:2024-11-25T05:54:00
db:NVDid:CVE-2024-48986date:2024-11-26T16:15:16.217

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2024-013348date:2024-11-25T00:00:00
db:NVDid:CVE-2024-48986date:2024-11-20T21:15:08.007