Lucene search

K
cve[email protected]CVE-2022-34835
HistoryJun 30, 2022 - 12:15 a.m.

CVE-2022-34835

2022-06-3000:15:08
CWE-787
web.nvd.nist.gov
50
12
cve-2022-34835
das u-boot
integer signedness error
stack-based buffer overflow
i2c md command
corruption
return address pointer

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.0%

In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based buffer overflow in the “i2c md” command enables the corruption of the return address pointer of the do_i2c_md function.

Affected configurations

NVD
Node
denxu-bootRange<2022.07
OR
denxu-bootMatch2022.07rc1
OR
denxu-bootMatch2022.07rc2
OR
denxu-bootMatch2022.07rc3
OR
denxu-bootMatch2022.07rc4
OR
denxu-bootMatch2022.07rc5
CPENameOperatorVersion
denx:u-bootdenx u-bootlt2022.07

Social References

More

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.0%