Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE.
Specially crafted MESH message could result in memory corruption when non-default build configuration is used.
This issue affects Apache NimBLE: through 1.7.0.
Users are recommended to upgrade to version 1.8.0, which fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/apache/mynewt-nimble/commit/4f75c0b3b466186beff40e8489870c6cee076aaa | Patch |
| https://lists.apache.org/thread/z8m7jqh54xybf9kz8q2l3tz92zsj7tmz | Vendor Advisory Mailing List |
| http://www.openwall.com/lists/oss-security/2024/11/26/2 | Mailing List Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-11-26 12:15
Updated : 2025-07-08 14:18
NVD link : CVE-2024-47248
Mitre link : CVE-2024-47248
CVE.ORG link : CVE-2024-47248
JSON object : View
Products Affected
apache
- nimble
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
