First published: Mon Jul 08 2024(Updated: )
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Renesas arm-trusted-firmware allows Local Execution of Code. This vulnerability is associated with program files https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/i... https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/io_rcar.C . In line 313 "addr_loaded_cnt" is checked not to be "CHECK_IMAGE_AREA_CNT" (5) or larger, this check does not halt the function. Immediately after (line 317) there will be an overflow in the buffer and the value of "dst" will be written to the area immediately after the buffer, which is "addr_loaded_cnt". This will allow an attacker to freely control the value of "addr_loaded_cnt" and thus control the destination of the write immediately after (line 318). The write in line 318 will then be fully controlled by said attacker, with whichever address and whichever value ("len") they desire.
Credit: cve@asrg.io
Affected Software | Affected Version | How to fix |
---|---|---|
Trusted Firmware-m |
https://github.com/renesas-rcar/arm-trusted-firmware/commit/235f85b654a031f7647e81b86fc8e4ffeb430164
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6563 is classified as a critical severity vulnerability due to its potential for local code execution.
To fix CVE-2024-6563, ensure you update to the latest version of the Renesas arm-trusted-firmware that addresses this vulnerability.
CVE-2024-6563 affects devices running the Renesas arm-trusted-firmware, particularly in embedded systems.
No, CVE-2024-6563 requires local access to exploit the vulnerability.
Exploiting CVE-2024-6563 can allow an attacker to execute arbitrary code on the affected system.