First published: Fri May 01 2020(Updated: )
In updatehub_probe, right after JSON parsing is complete, objects\[1] is accessed from the output structure in two different places. If the JSON contained less than two elements, this access would reference unitialized stack memory. This could result in a crash, denial of service, or possibly an information leak. Provided the fix in CVE-2020-10059 is applied, the attack requires compromise of the server. See NCC-ZEP-030 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions.
Credit: vulnerabilities@zephyrproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zephyr Project Manager | >=2.1.0<2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10060 has been rated as a high severity vulnerability due to its potential to cause denial of service.
To fix CVE-2020-10060, ensure that your version of the Zephyr Project Manager is updated to at least 2.4.0.
CVE-2020-10060 affects systems using the Zephyr Project Manager version between 2.1.0 and 2.4.0.
The potential consequences of CVE-2020-10060 include crashes and denial of service due to uninitialized stack memory access.
CVE-2020-10060 is not a remote exploit vulnerability, but it can lead to local execution issues if exploited.