CVE-2018-18439

DENX U-Boot through 2018.09-rc1 has a remotely exploitable buffer overflow via a malicious TFTP server because TFTP traffic is mishandled. Also, local exploitation can occur via a crafted kernel image.
References
Link Resource
http://www.openwall.com/lists/oss-security/2018/11/02/2 Exploit Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*
cpe:2.3:a:denx:u-boot:2018.09:rc1:*:*:*:*:*:*

History

23 Jan 2023, 18:39

Type Values Removed Values Added
CPE cpe:2.3:o:denx:das_u-boot_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:denx:das_u-boot:-:*:*:*:*:*:*:*
cpe:2.3:a:denx:u-boot:2018.09:rc1:*:*:*:*:*:*
cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*
First Time Denx u-boot

Information

Published : 2018-11-20 19:29

Updated : 2023-12-10 12:44


NVD link : CVE-2018-18439

Mitre link : CVE-2018-18439

CVE.ORG link : CVE-2018-18439


JSON object : View

Products Affected

denx

  • u-boot
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer