Skip to content

Possible remote memory corruption over the DASH7 modem

Low
glennergeerts published GHSA-ggxh-88wc-c4fg Nov 17, 2022

Package

No package listed

Affected versions

< 0.5.0

Patched versions

0.5.0

Description

Impact

A remote out of bounds write vulnerability was discovered in the DASH7 Alliance Protocol implementation of the Sub-IoT stack. A remote attacker could craft a malicious packet which could overwrite max 255 bytes in a statically allocated memory structure. In the default configuration, the overflow region does not contain any function pointers and since this variable is not allocated on the stack, we think it is not possible to trigger a remote code execution in any way. Users who reconfigured the MODULE_D7AP_PACKET_QUEUE_SIZE to 2 (from the default value 3) might be able to overwrite other memory contents, depending on other options and the compiler toolchain and settings used.

Patches

The vulnerability was fixed in the 0.5.0 release.

Credits

The vulnerability was discovered with the help of Firmalyzer's automated firmware analysis engine.

For more information

If you have any questions or comments about this advisory please open an issue in the GitHub repository or send a message in the gitter channel.

Severity

Low

CVE ID

No known CVE

Weaknesses