First published: Wed Jul 31 2019(Updated: )
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: rpc_lookup_reply.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DENX U-Boot | <=2019.07 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14200 is a vulnerability in Das U-Boot through version 2019.07 that allows for a stack-based buffer overflow in the nfs_handler reply helper function.
CVE-2019-14200 has a severity rating of 9.8, which is considered critical.
The affected software versions include all versions of DENX U-Boot up to and including version 2019.07.
CVE-2019-14200 is associated with CWE-119 and CWE-787.
Yes, you can find more information about CVE-2019-14200 at the following URLs: [https://blog.semmle.com/uboot-rce-nfs-vulnerability/](https://blog.semmle.com/uboot-rce-nfs-vulnerability/) and [https://gitlab.com/u-boot/u-boot](https://gitlab.com/u-boot/u-boot)