Access of Memory Location After End of Buffer in Dell PowerEdge Server BIOS and Dell Precision Rack BIOS



Published: 2024-08-01
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-0154
CWE-ID CWE-788
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
PowerEdge Server BIOS
Other software / Other software solutions

Precision Rack BIOS
Other software / Other software solutions

Vendor Dell

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Access of Memory Location After End of Buffer

EUVDB-ID: #VU95135

Risk: Low

CVSSv3.1: 3.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-0154

CWE-ID: CWE-788 - Access of Memory Location After End of Buffer

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to improper parameter initialization. A local low privileged attacker could potentially exploit this vulnerability to read the contents of non-SMM stack memory.

Mitigation

Install update from vendor's website.

Vulnerable software versions

PowerEdge Server BIOS: All versions

Precision Rack BIOS: All versions

External links

http://www.dell.com/support/kbdoc/en-us/000222898/dsa-2024-034-security-update-for-dell-poweredge-server-bios-for-an-improper-parameter-initialization-vulnerability


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###