First published: Mon Sep 25 2023(Updated: )
Two potential buffer overflow vulnerabilities at the following locations in the Zephyr eS-WiFi driver source code.
Credit: vulnerabilities@zephyrproject.org vulnerabilities@zephyrproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zephyrproject Zephyr | <=3.4.0 | |
<=3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-4259 is high (8.8).
The CVE-2023-4259 vulnerability can be exploited through buffer overflow attacks.
Software versions up to and including 3.4.0 of the Zephyr eS-WiFi driver are affected by CVE-2023-4259.
Yes, a fix for CVE-2023-4259 is available. Please refer to the Zephyr eS-WiFi driver's security advisory for more information.
You can find more information about CVE-2023-4259 in the security advisory published by Zephyr eS-WiFi driver on GitHub.