SB2018110702 - Remote code execution vulnerabilities in DENX U-Boot 



SB2018110702 - Remote code execution vulnerabilities in DENX U-Boot

Published: November 7, 2018 Updated: December 20, 2022

Security Bulletin ID SB2018110702
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2018-18440)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists in U-Boot open-source bootloader for embedded devices due to boundary error in the network image boot feature when handling malicious input. A remote attacker can trick the victim into loading a specially crafted image, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

2) Buffer overflow (CVE-ID: CVE-2018-18439)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists in U-Boot open-source bootloader for embedded devices due to boundary error in the filesystem image load feature when handling malicious input. A remote attacker can trick the victim into loading a specially crafted image, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Install update from vendor's website.