
---------- Forwarded message --------- От: cve-request@mitre.org Date: вт, 19 дек. 2023 г. в 20:39 Subject: Re: [scr1564375] your CVE ID requests To: sploitem@gmail.com Cc: cve-request@mitre.org
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
[Suggested description] Integer underflow in ipv6 net component when processing incoming packets.
udp->udp_len is not verified before substruction leading to large number in len parameter (unsigned int). This can lead to DoS or code execution.
[Vulnerability Type] Integer Overflow
[Vendor of Product] U-Boot
[Affected Product Code Base] U-boot - <= v2024.01-rc3
[Affected Component] u-boot/net/net6.c
[Attack Type] Remote
[Impact Code execution] true
[Impact Denial of Service] true
[Attack Vectors] Crafted ipv6 udp packet.
[Reference] https://github.com/u-boot/u-boot/blob/master/net/net6.c#L442C18-L442C18
[Discoverer] sploitem
This request did not receive a CVE ID assignment as CVEs are not assigned to Release Candidate (rc) versions of products.
- -- CVE Assignment Team M/S M300, 202 Burlington Road, Bedford, MA 01730 USA [ A PGP key is available for encrypted communications at https://cve.mitre.org/cve/request_id.html ]