ID

VAR-202007-0644


CVE

CVE-2020-15350


TITLE

RIOT Classic buffer overflow vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-007762

DESCRIPTION

RIOT 2020.04 has a buffer overflow in the base64 decoder. The decoding function base64_decode() uses an output buffer estimation function to compute the required buffer capacity and validate against the provided buffer size. The base64_estimate_decode_size() function calculates the expected decoded size with an arithmetic round-off error and does not take into account possible padding bytes. Due to this underestimation, it may be possible to craft base64 input that causes a buffer overflow. RIOT Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. RIOT RIOT-OS is a set of operating systems used in the field of Internet of Things. Remote attackers can use this vulnerability to execute arbitrary code on the system with the help of specially crafted parameters

Trust: 2.7

sources: NVD: CVE-2020-15350 // JVNDB: JVNDB-2020-007762 // CNVD: CNVD-2021-18037 // CNNVD: CNNVD-202007-340

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-18037

AFFECTED PRODUCTS

vendor:riot osmodel:riotscope:eqversion:2020.04

Trust: 1.0

vendor:riotmodel:riotscope:eqversion:2020.04

Trust: 0.8

vendor:riotmodel:riot-osscope:eqversion:2020.04

Trust: 0.6

sources: CNVD: CNVD-2021-18037 // JVNDB: JVNDB-2020-007762 // NVD: CVE-2020-15350

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-15350
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2020-007762
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2021-18037
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202007-340
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2020-15350
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-007762
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2021-18037
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-15350
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-007762
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-18037 // JVNDB: JVNDB-2020-007762 // CNNVD: CNNVD-202007-340 // NVD: CVE-2020-15350

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-131

Trust: 1.0

problemtype:CWE-120

Trust: 0.8

sources: JVNDB: JVNDB-2020-007762 // NVD: CVE-2020-15350

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202007-340

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202007-340

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-007762

PATCH

title:sys/base64: Fix, unit test cleanup, and benchmark #14400url:https://github.com/RIOT-OS/RIOT/pull/14400

Trust: 0.8

title:Patch for RIOT buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/253051

Trust: 0.6

title:RIOT Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=124316

Trust: 0.6

sources: CNVD: CNVD-2021-18037 // JVNDB: JVNDB-2020-007762 // CNNVD: CNNVD-202007-340

EXTERNAL IDS

db:NVDid:CVE-2020-15350

Trust: 3.0

db:JVNDBid:JVNDB-2020-007762

Trust: 0.8

db:CNVDid:CNVD-2021-18037

Trust: 0.6

db:CNNVDid:CNNVD-202007-340

Trust: 0.6

sources: CNVD: CNVD-2021-18037 // JVNDB: JVNDB-2020-007762 // CNNVD: CNNVD-202007-340 // NVD: CVE-2020-15350

REFERENCES

url:https://drive.google.com/file/d/1jmcai8uawv1-an5ucghixt2tedxce1lk/view?usp=sharing

Trust: 1.6

url:https://github.com/riot-os/riot/pull/14400

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-15350

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-15350

Trust: 0.8

sources: JVNDB: JVNDB-2020-007762 // CNNVD: CNNVD-202007-340 // NVD: CVE-2020-15350

SOURCES

db:CNVDid:CNVD-2021-18037
db:JVNDBid:JVNDB-2020-007762
db:CNNVDid:CNNVD-202007-340
db:NVDid:CVE-2020-15350

LAST UPDATE DATE

2024-11-23T22:33:24.554000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-18037date:2021-03-17T00:00:00
db:JVNDBid:JVNDB-2020-007762date:2020-08-25T00:00:00
db:CNNVDid:CNNVD-202007-340date:2020-07-30T00:00:00
db:NVDid:CVE-2020-15350date:2024-11-21T05:05:23.487

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-18037date:2021-03-16T00:00:00
db:JVNDBid:JVNDB-2020-007762date:2020-08-25T00:00:00
db:CNNVDid:CNNVD-202007-340date:2020-07-07T00:00:00
db:NVDid:CVE-2020-15350date:2020-07-07T17:15:10.530