Open 0xdea opened 11 months ago
Hi, it's been one month since I reported this vulnerability, and I wanted to ask if you have any update. As standard practice, I plan to request a CVE ID for every confirmed vulnerability. I also intend to publish an advisory by February at the latest, unless there's a specific reason to postpone. Thanks!
Hi there, CVE-2024-25394 was assigned to this vulnerability. I'm planning to publish my security advisory and writeup on March 5th. Thanks.
Hi,
I would like to report other potential vulnerabilities in the current version of RT-Thread. Please let me know if you plan to ask for a CVE ID in case the vulnerabilities are confirmed. I'm available if you need further clarifications.
Multiple potential vulnerabilities in RT-Thread ymodem utility
Summary
I spotted some potential vulnerabilities at the following locations in the RT-Thread ymodem utility source code: https://github.com/RT-Thread/rt-thread/blob/master/components/utilities/ymodem/ry_sy.c#L149 https://github.com/RT-Thread/rt-thread/blob/master/components/utilities/ymodem/ry_sy.c#L205 https://github.com/RT-Thread/rt-thread/blob/master/components/utilities/ymodem/ry_sy.c#L225
Details
Unbounded
rt_sprintf()
in the_rym_send_begin()
function could lead to a buffer overflow at the marked line:Lack of NUL-termination in the
rym_download_file()
function at the marked line:Lack of NUL-termination in the
rym_upload_file()
function at the marked line:Impact
If the unchecked input above is confirmed to be attacker-controlled and crossing a security boundary, the impact of the reported vulnerabilities could range from information leakage to denial of service, or even arbitrary code execution.