Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE.
Specially crafted MESH message could result in memory corruption when non-default build configuration is used.
This issue affects Apache NimBLE: through 1.7.0.
Users are recommended to upgrade to version 1.8.0, which fixes the issue.
References
Configurations
No configuration.
History
06 Dec 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Nov 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
Summary |
|
26 Nov 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-26 12:15
Updated : 2024-12-06 11:15
NVD link : CVE-2024-47248
Mitre link : CVE-2024-47248
CVE.ORG link : CVE-2024-47248
JSON object : View
Products Affected
No product.
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')