First published: Tue Jul 07 2020(Updated: )
RIOT 2020.04 has a buffer overflow in the base64 decoder. The decoding function base64_decode() uses an output buffer estimation function to compute the required buffer capacity and validate against the provided buffer size. The base64_estimate_decode_size() function calculates the expected decoded size with an arithmetic round-off error and does not take into account possible padding bytes. Due to this underestimation, it may be possible to craft base64 input that causes a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Riot-os Riot | =2020.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15350 is categorized as a high severity vulnerability due to the potential for remote code execution resulting from the buffer overflow.
To fix CVE-2020-15350, update to a patched version of RIOT OS that addresses the buffer overflow in the base64 decoder.
CVE-2020-15350 affects the RIOT OS version 2020.04.
CVE-2020-15350 is classified as a buffer overflow vulnerability.
The impact of CVE-2020-15350 can lead to denial of service or potential remote code execution, compromising system integrity.