First published: Tue May 30 2023(Updated: )
At the most basic level, an invalid pointer can be input that crashes the device, but with more knowledge of the device’s memory layout, further exploitation is possible.
Credit: vulnerabilities@zephyrproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zephyrproject Zephyr | <=3.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-0779 is high, with a severity value of 7.7.
CVE-2023-0779 affects Zephyrproject Zephyr up to version 3.2.0.
CVE-2023-0779 can be exploited by inputting an invalid pointer that crashes the device, and with knowledge of the device's memory layout, further exploitation is possible.
Yes, a fix for CVE-2023-0779 is available. Please refer to the provided reference link for more information.
More information about CVE-2023-0779 can be found in the provided reference link.