SB2023012312 - Multiple vulnerabilities in Zephyr



SB2023012312 - Multiple vulnerabilities in Zephyr

Published: January 23, 2023

Security Bulletin ID SB2023012312
Severity
Low
Patch available
NO
Number of vulnerabilities 3
Exploitation vector Physical access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Improper Check or Handling of Exceptional Conditions (CVE-ID: CVE-2023-0397)

The vulnerability allows a local attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to unchecked input in le_read_buffer_size_complete. An attacker with physical access can use a defect bluetooth controller and perform a denial of service (DoS) attack.


2) Buffer overflow (CVE-ID: CVE-2023-0396)

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the most functions that process HCI command responses. An attacker with physical access can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Double Free (CVE-ID: CVE-2022-3806)

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in bluetooth hci. An attacker with physical access can trigger double free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.