Unchecked user input length in /subsys/net/l2/wifi/wifi_shell.c can cause buffer overflows.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
The product does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow.
Link | Tags |
---|---|
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-853q-q69w-gf5j | vendor advisory exploit |
http://www.openwall.com/lists/oss-security/2023/11/07/1 | mailing list |
http://seclists.org/fulldisclosure/2023/Nov/1 | third party advisory mailing list |
http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html | third party advisory exploit |