Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 26 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mbed
Mbed mbed |
|
CPEs | cpe:2.3:o:mbed:mbed:6.16.0:*:*:*:*:*:*:* | |
Vendors & Products |
Mbed
Mbed mbed |
|
Metrics |
ssvc
|
Fri, 22 Nov 2024 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Arm
Arm mbed |
|
Weaknesses | CWE-120 | |
CPEs | cpe:2.3:o:arm:mbed:6.16.0:*:*:*:*:*:*:* | |
Vendors & Products |
Arm
Arm mbed |
|
Metrics |
cvssV3_1
|
Wed, 20 Nov 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered in MBed OS 6.16.0. Its hci parsing software dynamically determines the length of certain hci packets by reading a byte from its header. Certain events cause a callback, the logic for which allocates a buffer (the length of which is determined by looking up the event type in a table). The subsequent write operation, however, copies the amount of data specified in the packet header, which may lead to a buffer overflow. This bug is trivial to exploit for a denial of service but is not certain to suffice to bring the system down and can generally not be exploited further because the exploitable buffer is dynamically allocated. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-26T15:57:50.159Z
Reserved: 2024-10-11T00:00:00
Link: CVE-2024-48986

Updated: 2024-11-25T20:56:50.506Z

Status : Modified
Published: 2024-11-20T21:15:08.007
Modified: 2024-11-26T16:15:16.217
Link: CVE-2024-48986

No data.

No data.