Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2024-1633 | First vendor Publication | 2024-02-19 |
Vendor | Cve | Last vendor Modification | 2025-01-24 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N | |||
---|---|---|---|
Overall CVSS Score | 2 | ||
Base Score | 2 | Environmental Score | 2 |
impact SubScore | 1.4 | Temporal Score | 2 |
Exploitabality Sub Score | 0.5 | ||
Attack Vector | Physical | Attack Complexity | High |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | None |
Integrity Impact | Low | Availability Impact | None |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
During the secure boot, bl2 (the second stage of the bootloader) loops over images defined in the table ābl2_mem_params_descsā . For each image, the bl2 reads the image length and destination from the imageās certificate.Ā Because of the way of reading from the image, which base onĀ 32-bit unsigned integer value, it can result toĀ an integer overflow.Ā An attacker can bypass memory range restriction and write data out of buffer bounds, which could result in bypass of secure boot. Affected git version fromĀ c2f286820471ed276c57e603762bd831873e5a17 until (notĀ |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1633 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2025-01-24 21:20:49 |
|
2024-11-25 09:26:58 |
|
2024-02-21 05:27:24 |
|
2024-02-19 21:27:25 |
|