Two potential buffer overflow vulnerabilities at the following locations in the Zephyr eS-WiFi driver source code.
References
Link | Resource |
---|---|
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gghm-c696-f4j4 | Exploit Vendor Advisory |
http://www.openwall.com/lists/oss-security/2023/11/07/1 | Mailing List |
http://seclists.org/fulldisclosure/2023/Nov/1 | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html | Third Party Advisory |
Configurations
History
22 Dec 2023, 19:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2023/11/07/1 - Mailing List | |
References | () http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html - Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2023/Nov/1 - Mailing List, Third Party Advisory |
14 Nov 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Nov 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2023, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-26 00:15
Updated : 2023-12-22 19:33
NVD link : CVE-2023-4259
Mitre link : CVE-2023-4259
JSON object : View
Products Affected
zephyrproject
- zephyr
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')