Specially crafted MESH message could result in memory corruption when non-default build configuration is used.
This issue affects Apache NimBLE: through 1.7.0.
Users are recommended to upgrade to version 1.8.0, which fixes the issue.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 08 Jul 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache nimble |
|
| CPEs | cpe:2.3:a:apache:nimble:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache nimble |
Fri, 06 Dec 2024 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 26 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 26 Nov 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 26 Nov 2024 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE. Specially crafted MESH message could result in memory corruption when non-default build configuration is used. This issue affects Apache NimBLE: through 1.7.0. Users are recommended to upgrade to version 1.8.0, which fixes the issue. | |
| Title | Apache NimBLE: Buffer overflow in NimBLE MESH Bluetooth stack | |
| Weaknesses | CWE-120 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-12-06T10:14:24.864Z
Reserved: 2024-09-23T08:20:53.910Z
Link: CVE-2024-47248
Updated: 2024-11-26T13:09:20.747Z
Status : Analyzed
Published: 2024-11-26T12:15:19.007
Modified: 2025-07-08T14:18:25.403
Link: CVE-2024-47248
No data.
OpenCVE Enrichment
No data.