• CVE-2024-6563

发布时间: 2024年7月12日

修改时间: 2024年7月19日

概要

Buffer Copy without Checking Size of Input ( Classic Buffer Overflow ) vulnerability in Renesas arm-trusted-firmware allows Local Execution of Code. This vulnerability is associated with program files https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/i... https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/io_rcar.C .In line 313 addr_loaded_cnt is checked not to be CHECK_IMAGE_AREA_CNT (5) or larger, this check does not halt the function. Immediately after (line 317) there will be an overflow in the buffer and the value of dst will be written to the area immediately after the buffer, which is addr_loaded_cnt . This will allow an attacker to freely control the value of addr_loaded_cnt and thus control the destination of the write immediately after (line 318). The write in line 318 will then be fully controlled by said attacker, with whichever address and whichever value ( len ) they desire.

CVSS v3 指标

NVD openEuler
CVSS评分 6.7 6.7
Attack Vector Local Local
Attack Complexity Low Low
Privileges Required High High
User Interaction None None
Scope Unchanged Unchanged
Confidentiality High High
Integrity High High
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-3111 Buffer Copy without Checking Size of Input ( Classic Buffer Overflow ) vulnerability in Renesas arm-trusted-firmware allows Local Execution of Code. This vulnerability is associated with program files https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/i... https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/io_rcar.C .In line 313 addr_loaded_cnt is checked not to be CHECK_IMAGE_AREA_CNT (5) or larger, this check does not halt the function. Immediately after (line 317) there will be an overflow in the buffer and the value of dst will be written to the area immediately after the buffer, which is addr_loaded_cnt . This will allow an attacker to freely control the value of addr_loaded_cnt and thus control the destination of the write immediately after (line 318). The write in line 318 will then be fully controlled by said attacker, with whichever address and whichever value ( len ) they desire. 2024年7月12日
KylinSec-SA-2024-3116 arm-trusted-firmware security update 2024年7月19日
KylinSec-SA-2024-4965 arm-trusted-firmware security update 2024年7月19日

影响产品

产品 状态
KY3.4-5A arm-trusted-firmware Unaffected
KY3.5.2 arm-trusted-firmware Fixed
V6 arm-trusted-firmware Fixed