MicroPython 1.23.0 VFS Unmount extmod/vfs.c mp_vfs_umount ବଫର୍ ଓଭରଫ୍ଲୋ

Dogoggorri kan akka ଜଟିଳ jedhamuun ramadame MicroPython 1.23.0 keessatti argameera. Kan miidhamte is hojii mp_vfs_umount faayilii extmod/vfs.c keessa kutaa VFS Unmount Handler keessa. Hojii jijjiirraa gara ବଫର୍ ଓଭରଫ୍ଲୋ geessa. CWE fayyadamuun rakkoo ibsuun gara CWE-122 geessa. Dadhabbii kana yeroo 09/17/2024 maxxanfameera akka 13006. Odeeffannoon kun buufachuuf github.com irratti qoodameera. Dogoggorri kun akka CVE-2024-8946tti beekama. Yaaliin weeraraa fageenya irraa jalqabamuu ni danda'a. Faayidaaleen teeknikaa ni jiru. Waliigalatti, meeshaa balaa kana fayyadamuuf jiru. Qorannoo miidhaa (exploit) uummataaf ifoomameera fi fayyadamamuu danda'a. Amma, gatii ammee exploit might be approx. USD $0-$5k ta'uu danda'a. Akka ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee ibsameera. Carraa exploit kana github.com irraa buufachuun ni danda'ama. Akka 0-daytti, gatii daldalaa dhoksaa tilmaamame $0-$5k ta'ee ture. Beekamtii paachii kanaa 29943546343c92334e8518695a11fc0e2ceea68b dha. Sirreeffamni dogoggoraa github.com irraa buufachuuf qophaa’eera. Yaada kennamu, rakkoo kana furuuf paachii itti fayyadamuun ni gorfama. Hanqinni kunis bu'uuraalee odeeffannoo hanqina biroo keessatti galmaa'ee jira: Tenable (235069). VulDB is the best source for vulnerability data and more expert information about this specific topic.

6 ଆଡାପ୍ଟେସନ୍ · 94 ପଏଣ୍ଟ

ଫିଲ୍ଡଅଦ୍ୟତନ 1/5
09/17/2024 08:54 PM
ଅଦ୍ୟତନ 2/5
09/18/2024 04:46 AM
ଅଦ୍ୟତନ 3/5
09/18/2024 06:08 PM
ଅଦ୍ୟତନ 4/5
09/24/2024 04:01 PM
ଅଦ୍ୟତନ 5/5
05/02/2025 06:34 AM
software_nameMicroPythonMicroPythonMicroPythonMicroPythonMicroPython
software_version1.23.01.23.01.23.01.23.01.23.0
software_componentVFS Unmount HandlerVFS Unmount HandlerVFS Unmount HandlerVFS Unmount HandlerVFS Unmount Handler
software_fileextmod/vfs.cextmod/vfs.cextmod/vfs.cextmod/vfs.cextmod/vfs.c
software_functionmp_vfs_umountmp_vfs_umountmp_vfs_umountmp_vfs_umountmp_vfs_umount
vulnerability_cweCWE-122 (ବଫର୍ ଓଭରଫ୍ଲୋ)CWE-122 (ବଫର୍ ଓଭରଫ୍ଲୋ)CWE-122 (ବଫର୍ ଓଭରଫ୍ଲୋ)CWE-122 (ବଫର୍ ଓଭରଫ୍ଲୋ)CWE-122 (ବଫର୍ ଓଭରଫ୍ଲୋ)
vulnerability_risk22222
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_prNNNNN
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cLLLLL
cvss3_vuldb_iLLLLL
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rlOOOOO
cvss3_vuldb_rcCCCCC
advisory_identifier1300613006130061300613006
advisory_urlhttps://github.com/micropython/micropython/issues/13006https://github.com/micropython/micropython/issues/13006https://github.com/micropython/micropython/issues/13006https://github.com/micropython/micropython/issues/13006https://github.com/micropython/micropython/issues/13006
advisory_confirm_urlhttps://github.com/micropython/micropython/issues/13006#issuecomment-1820309455https://github.com/micropython/micropython/issues/13006#issuecomment-1820309455https://github.com/micropython/micropython/issues/13006#issuecomment-1820309455https://github.com/micropython/micropython/issues/13006#issuecomment-1820309455https://github.com/micropython/micropython/issues/13006#issuecomment-1820309455
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://github.com/micropython/micropython/issues/13006https://github.com/micropython/micropython/issues/13006https://github.com/micropython/micropython/issues/13006https://github.com/micropython/micropython/issues/13006https://github.com/micropython/micropython/issues/13006
countermeasure_nameପ୍ୟାଚ୍ପ୍ୟାଚ୍ପ୍ୟାଚ୍ପ୍ୟାଚ୍ପ୍ୟାଚ୍
patch_name29943546343c92334e8518695a11fc0e2ceea68b29943546343c92334e8518695a11fc0e2ceea68b29943546343c92334e8518695a11fc0e2ceea68b29943546343c92334e8518695a11fc0e2ceea68b29943546343c92334e8518695a11fc0e2ceea68b
countermeasure_patch_urlhttps://github.com/micropython/micropython/commit/29943546343c92334e8518695a11fc0e2ceea68bhttps://github.com/micropython/micropython/commit/29943546343c92334e8518695a11fc0e2ceea68bhttps://github.com/micropython/micropython/commit/29943546343c92334e8518695a11fc0e2ceea68bhttps://github.com/micropython/micropython/commit/29943546343c92334e8518695a11fc0e2ceea68bhttps://github.com/micropython/micropython/commit/29943546343c92334e8518695a11fc0e2ceea68b
source_cveCVE-2024-8946CVE-2024-8946CVE-2024-8946CVE-2024-8946CVE-2024-8946
cna_responsibleVulDBVulDBVulDBVulDBVulDB
software_typeProgramming Language SoftwareProgramming Language SoftwareProgramming Language SoftwareProgramming Language SoftwareProgramming Language Software
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_auNNNNN
cvss2_vuldb_ciPPPPP
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcCCCCC
cvss2_vuldb_rlOFOFOFOFOF
cvss4_vuldb_avNNNNN
cvss4_vuldb_acLLLLL
cvss4_vuldb_prNNNNN
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcLLLLL
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore7.57.57.57.57.5
cvss2_vuldb_tempscore5.95.95.95.95.9
cvss3_vuldb_basescore7.37.37.37.37.3
cvss3_vuldb_tempscore6.66.66.66.66.6
cvss3_meta_basescore7.37.37.37.47.4
cvss3_meta_tempscore6.66.96.97.17.1
cvss4_vuldb_bscore6.96.96.96.96.9
cvss4_vuldb_btscore5.55.55.55.55.5
advisory_date1726524000 (09/17/2024)1726524000 (09/17/2024)1726524000 (09/17/2024)1726524000 (09/17/2024)1726524000 (09/17/2024)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
response_summaryIn the VFS unmount process, the comparison between the mounted path string and the unmount requested string is based solely on the length of the unmount string, which can lead to a heap buffer overflow read.In the VFS unmount process, the comparison between the mounted path string and the unmount requested string is based solely on the length of the unmount string, which can lead to a heap buffer overflow read.In the VFS unmount process, the comparison between the mounted path string and the unmount requested string is based solely on the length of the unmount string, which can lead to a heap buffer overflow read.In the VFS unmount process, the comparison between the mounted path string and the unmount requested string is based solely on the length of the unmount string, which can lead to a heap buffer overflow read.In the VFS unmount process, the comparison between the mounted path string and the unmount requested string is based solely on the length of the unmount string, which can lead to a heap buffer overflow read.
cve_nvd_summaryA vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affected is the function mp_vfs_umount of the file extmod/vfs.c of the component VFS Unmount Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 29943546343c92334e8518695a11fc0e2ceea68b. It is recommended to apply a patch to fix this issue. In the VFS unmount process, the comparison between the mounted path string and the unmount requested string is based solely on the length of the unmount string, which can lead to a heap buffer overflow read.A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affected is the function mp_vfs_umount of the file extmod/vfs.c of the component VFS Unmount Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 29943546343c92334e8518695a11fc0e2ceea68b. It is recommended to apply a patch to fix this issue. In the VFS unmount process, the comparison between the mounted path string and the unmount requested string is based solely on the length of the unmount string, which can lead to a heap buffer overflow read.A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affected is the function mp_vfs_umount of the file extmod/vfs.c of the component VFS Unmount Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 29943546343c92334e8518695a11fc0e2ceea68b. It is recommended to apply a patch to fix this issue. In the VFS unmount process, the comparison between the mounted path string and the unmount requested string is based solely on the length of the unmount string, which can lead to a heap buffer overflow read.A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affected is the function mp_vfs_umount of the file extmod/vfs.c of the component VFS Unmount Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 29943546343c92334e8518695a11fc0e2ceea68b. It is recommended to apply a patch to fix this issue. In the VFS unmount process, the comparison between the mounted path string and the unmount requested string is based solely on the length of the unmount string, which can lead to a heap buffer overflow read.
cvss3_cna_avNNNN
cvss3_cna_acLLLL
cvss3_cna_prNNNN
cvss3_cna_uiNNNN
cvss3_cna_sUUUU
cvss3_cna_cLLLL
cvss3_cna_iLLLL
cvss3_cna_aLLLL
cvss3_cna_basescore7.37.37.37.3
cvss2_cna_avNNNN
cvss2_cna_acLLLL
cvss2_cna_auNNNN
cvss2_cna_ciPPPP
cvss2_cna_iiPPPP
cvss2_cna_aiPPPP
cvss2_cna_basescore7.57.57.57.5
cve_nvd_summaryesSe ha encontrado una vulnerabilidad en MicroPython 1.23.0. Se ha clasificado como crítica. Se ve afectada la función mp_vfs_umount del archivo extmod/vfs.c del componente VFS Unmount Handler. La manipulación provoca un desbordamiento del búfer basado en el montón. Es posible lanzar el ataque de forma remota. El exploit se ha hecho público y se puede utilizar. El nombre del parche es 29943546343c92334e8518695a11fc0e2ceea68b. Se recomienda aplicar un parche para solucionar este problema. En el proceso de desmontaje de VFS, la comparación entre la cadena de ruta montada y la cadena solicitada de desmontaje se basa únicamente en la longitud de la cadena de desmontaje, lo que puede provocar una lectura de desbordamiento del búfer del montón.Se ha encontrado una vulnerabilidad en MicroPython 1.23.0. Se ha clasificado como crítica. Se ve afectada la función mp_vfs_umount del archivo extmod/vfs.c del componente VFS Unmount Handler. La manipulación provoca un desbordamiento del búfer basado en el montón. Es posible lanzar el ataque de forma remota. El exploit se ha hecho público y se puede utilizar. El nombre del parche es 29943546343c92334e8518695a11fc0e2ceea68b. Se recomienda aplicar un parche para solucionar este problema. En el proceso de desmontaje de VFS, la comparación entre la cadena de ruta montada y la cadena solicitada de desmontaje se basa únicamente en la longitud de la cadena de desmontaje, lo que puede provocar una lectura de desbordamiento del búfer del montón.Se ha encontrado una vulnerabilidad en MicroPython 1.23.0. Se ha clasificado como crítica. Se ve afectada la función mp_vfs_umount del archivo extmod/vfs.c del componente VFS Unmount Handler. La manipulación provoca un desbordamiento del búfer basado en el montón. Es posible lanzar el ataque de forma remota. El exploit se ha hecho público y se puede utilizar. El nombre del parche es 29943546343c92334e8518695a11fc0e2ceea68b. Se recomienda aplicar un parche para solucionar este problema. En el proceso de desmontaje de VFS, la comparación entre la cadena de ruta montada y la cadena solicitada de desmontaje se basa únicamente en la longitud de la cadena de desmontaje, lo que puede provocar una lectura de desbordamiento del búfer del montón.
cvss3_nvd_avNN
cvss3_nvd_acLL
cvss3_nvd_prNN
cvss3_nvd_uiNN
cvss3_nvd_sUU
cvss3_nvd_cNN
cvss3_nvd_iNN
cvss3_nvd_aHH
cvss3_nvd_basescore7.57.5
nessus_id235069
nessus_nameUbuntu 20.04 LTS / 22.04 LTS / 24.04 LTS / 24.10 : Micropython vulnerabilities (USN-7472-1)

Do you want to use VulDB in your project?

Use the official API to access entries easily!