SB2018110702 - Remote code execution vulnerabilities in DENX U-Boot
Published: November 7, 2018 Updated: December 20, 2022
Security Bulletin ID
SB2018110702
Severity
High
Patch available
YES
Number of vulnerabilities
2
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2018-18440)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists in U-Boot open-source bootloader for embedded devices due to boundary error in the network image boot feature when handling malicious input. A remote attacker can trick the victim into loading a specially crafted image, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
2) Buffer overflow (CVE-ID: CVE-2018-18439)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists in U-Boot open-source bootloader for embedded devices due to boundary error in the filesystem image load feature when handling malicious input. A remote attacker can trick the victim into loading a specially crafted image, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.