A vulnerability was found in MicroPython up to 1.21.0. It has been classified as critical. Affected is the function slice_indices of the file objslice.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.22.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-249180.
References
Configurations
History
21 Nov 2024, 08:45
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 7.3 |
References | () https://github.com/micropython/micropython/issues/13007 - Exploit, Issue Tracking | |
References | () https://github.com/micropython/micropython/pull/13039 - Issue Tracking | |
References | () https://github.com/micropython/micropython/pull/13039/commits/f397a3ec318f3ad05aa287764ae7cef32202380f - Patch | |
References | () https://github.com/micropython/micropython/releases/tag/v1.22.0 - Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4E2HYWCZB5R4SHY4SZZZSFDMD64N4SOZ/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D3WWY5JY4RTJE25APB4REGDUDPATG6H7/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEK46QAJOXXDZOWOIE2YACUOCZFWOBCK/ - | |
References | () https://vuldb.com/?ctiid.249180 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?id.249180 - Third Party Advisory |
06 Apr 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Apr 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Jan 2024, 14:47
Type | Values Removed | Values Added |
---|---|---|
Summary | (es) Se encontró una vulnerabilidad en MicroPython hasta 1.21.0. Ha sido clasificada como crítica. La función slice_indices del archivo objslice.c es afectada por la vulnerabilidad. La manipulación conduce a un desbordamiento de búfer de almacenamiento dinámico. Es posible lanzar el ataque de forma remota. La explotación ha sido divulgada al público y puede utilizarse. La actualización a la versión 1.22.0 puede solucionar este problema. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-249180. | |
CWE | CWE-787 | |
CPE | cpe:2.3:a:micropython:micropython:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
First Time |
Micropython
Micropython micropython |
|
References | () https://github.com/micropython/micropython/issues/13007 - Exploit, Issue Tracking | |
References | () https://github.com/micropython/micropython/pull/13039 - Issue Tracking | |
References | () https://github.com/micropython/micropython/pull/13039/commits/f397a3ec318f3ad05aa287764ae7cef32202380f - Patch | |
References | () https://github.com/micropython/micropython/releases/tag/v1.22.0 - Release Notes | |
References | () https://vuldb.com/?ctiid.249180 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?id.249180 - Third Party Advisory |
29 Dec 2023, 13:56
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
29 Dec 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-29 07:15
Updated : 2024-11-21 08:45
NVD link : CVE-2023-7158
Mitre link : CVE-2023-7158
CVE.ORG link : CVE-2023-7158
JSON object : View
Products Affected
micropython
- micropython