USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2020-2484 | USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions. | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    No history.
Status: PUBLISHED
Assigner: zephyr
Published:
Updated: 2024-09-17T02:12:14.643Z
Reserved: 2020-03-03T00:00:00
Link: CVE-2020-10019
No data.
Status : Modified
Published: 2020-05-11T23:15:11.317
Modified: 2024-11-21T04:54:39.990
Link: CVE-2020-10019
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD