Specially crafted MESH message could result in memory corruption when non-default build configuration is used.
This issue affects Apache NimBLE: through 1.7.0.
Users are recommended to upgrade to version 1.8.0, which fixes the issue.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 08 Jul 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache nimble |
|
| CPEs | cpe:2.3:a:apache:nimble:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache nimble |
Fri, 06 Dec 2024 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 26 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 26 Nov 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 26 Nov 2024 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE. Specially crafted MESH message could result in memory corruption when non-default build configuration is used. This issue affects Apache NimBLE: through 1.7.0. Users are recommended to upgrade to version 1.8.0, which fixes the issue. | |
| Title | Apache NimBLE: Buffer overflow in NimBLE MESH Bluetooth stack | |
| Weaknesses | CWE-120 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-12-06T10:14:24.864Z
Reserved: 2024-09-23T08:20:53.910Z
Link: CVE-2024-47248
Updated: 2024-11-26T13:09:20.747Z
Status : Analyzed
Published: 2024-11-26T12:15:19.007
Modified: 2025-07-08T14:18:25.403
Link: CVE-2024-47248
No data.
OpenCVE Enrichment
No data.