• 公告ID (KylinSec-SA-2024-3111)

摘要:

Buffer Copy without Checking Size of Input ( Classic Buffer Overflow ) vulnerability in Renesas arm-trusted-firmware allows Local Execution of Code. This vulnerability is associated with program files https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/i... https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/io_rcar.C .In line 313 addr_loaded_cnt is checked not to be CHECK_IMAGE_AREA_CNT (5) or larger, this check does not halt the function. Immediately after (line 317) there will be an overflow in the buffer and the value of dst will be written to the area immediately after the buffer, which is addr_loaded_cnt . This will allow an attacker to freely control the value of addr_loaded_cnt and thus control the destination of the write immediately after (line 318). The write in line 318 will then be fully controlled by said attacker, with whichever address and whichever value ( len ) they desire.

安全等级: Low

公告ID: KylinSec-SA-2024-3111

发布日期: 2024年7月12日

关联CVE: CVE-2024-6563  

  • 详细介绍

1. 漏洞描述

   

Buffer Copy without Checking Size of Input ( Classic Buffer Overflow ) vulnerability in Renesas arm-trusted-firmware allows Local Execution of Code. This vulnerability is associated with program files https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/i... https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/io_rcar.C .In line 313 addr_loaded_cnt is checked not to be CHECK_IMAGE_AREA_CNT (5) or larger, this check does not halt the function. Immediately after (line 317) there will be an overflow in the buffer and the value of dst will be written to the area immediately after the buffer, which is addr_loaded_cnt . This will allow an attacker to freely control the value of addr_loaded_cnt and thus control the destination of the write immediately after (line 318). The write in line 318 will then be fully controlled by said attacker, with whichever address and whichever value ( len ) they desire.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-6563 KY3.4-5A arm-trusted-firmware Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-3110 下一篇:KylinSec-SA-2024-3112