First published: Tue Nov 20 2018(Updated: )
DENX U-Boot through 2018.09-rc1 has a remotely exploitable buffer overflow via a malicious TFTP server because TFTP traffic is mishandled. Also, local exploitation can occur via a crafted kernel image.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DENX U-Boot | <2018.09 | |
DENX U-Boot | =2018.09-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-18439 is critical, with a CVSS score of 9.8.
DENX U-Boot versions up to and including 2018.09-rc1 are affected by CVE-2018-18439.
CVE-2018-18439 can be remotely exploited through a malicious TFTP server by mishandling TFTP traffic.
Yes, CVE-2018-18439 can be locally exploited with a crafted kernel image.
Yes, updating to a version beyond 2018.09-rc1 of DENX U-Boot can fix the vulnerability.