CVE-2024-6563 Vulnerability Details

  /     /     /  

CVE-2024-6563 Metadata Quick Info

CVE Published: 08/07/2024 | CVE Updated: 01/08/2024 | CVE Year: 2024
Source: ASRG | Vendor: Renesas | Product: rcar_gen3_v2.5
Status : PUBLISHED

CVE-2024-6563 Description

Buffer Copy without Checking Size of Input (\'Classic Buffer Overflow\') vulnerability in Renesas arm-trusted-firmware allows Local Execution of Code. This vulnerability is associated with program files https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/i... https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/io_rcar.C . In line 313 "addr_loaded_cnt" is checked not to be "CHECK_IMAGE_AREA_CNT" (5) or larger, this check does not halt the function. Immediately after (line 317) there will be an overflow in the buffer and the value of "dst" will be written to the area immediately after the buffer, which is "addr_loaded_cnt". This will allow an attacker to freely control the value of "addr_loaded_cnt" and thus control the destination of the write immediately after (line 318). The write in line 318 will then be fully controlled by said attacker, with whichever address and whichever value ("len") they desire.

Metrics

CVSS Version: 3.1 | Base Score: 7.5 HIGH
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

l➤ Exploitability Metrics:
    Attack Vector (AV)* LOCAL
    Attack Complexity (AC)* HIGH
    Privileges Required (PR)* HIGH
    User Interaction (UI)* NONE
    Scope (S)* CHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* HIGH
    Integrity Impact (I)* HIGH
    Availability Impact (A)* HIGH

Weakness Enumeration (CWE)

CWE-ID: CWE-123
CWE Name: CWE-123: Write-what-where Condition
Source: Renesas

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-549
CAPEC Description: CAPEC-549 Local Execution of Code


Source: NVD (National Vulnerability Database).