Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE.
Specially crafted MESH message could result in memory corruption when non-default build configuration is used.
This issue affects Apache NimBLE: through 1.7.0.
Users are recommended to upgrade to version 1.8.0, which fixes the issue.
References
Link | Resource |
---|---|
https://github.com/apache/mynewt-nimble/commit/4f75c0b3b466186beff40e8489870c6cee076aaa | Patch |
https://lists.apache.org/thread/z8m7jqh54xybf9kz8q2l3tz92zsj7tmz | Vendor Advisory Mailing List |
http://www.openwall.com/lists/oss-security/2024/11/26/2 | Mailing List Vendor Advisory |
Configurations
History
08 Jul 2025, 14:18
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apache nimble
Apache |
|
CPE | cpe:2.3:a:apache:nimble:*:*:*:*:*:*:*:* | |
References | () https://github.com/apache/mynewt-nimble/commit/4f75c0b3b466186beff40e8489870c6cee076aaa - Patch | |
References | () https://lists.apache.org/thread/z8m7jqh54xybf9kz8q2l3tz92zsj7tmz - Vendor Advisory, Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/11/26/2 - Mailing List, Vendor Advisory |
06 Dec 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Nov 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
26 Nov 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-26 12:15
Updated : 2025-07-08 14:18
NVD link : CVE-2024-47248
Mitre link : CVE-2024-47248
CVE.ORG link : CVE-2024-47248
JSON object : View
Products Affected
apache
- nimble
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')