Description
A vulnerability was found in MicroPython up to 1.21.0. It has been classified as critical. Affected is the function slice_indices of the file objslice.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.22.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-249180.
References (9)
Core 9
Core References
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/4E2HYWCZB5R4SHY4SZZZSFDMD64N4SOZ/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/D3WWY5JY4RTJE25APB4REGDUDPATG6H7/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/TEK46QAJOXXDZOWOIE2YACUOCZFWOBCK/
Third Party Advisory vdb-entry
technical-description
https://vuldb.com/?id.249180
Permissions Required, Third Party Advisory signature
permissions-required
https://vuldb.com/?ctiid.249180
Exploit, Issue Tracking exploit
issue-tracking
https://github.com/micropython/micropython/issues/13007
Issue Tracking issue-tracking
https://github.com/micropython/micropython/pull/13039
Patch issue-tracking
patch
https://github.com/micropython/micropython/pull/13039/commits/f397a3ec318f3ad05aa287764ae7cef32202380f
Release Notes patch
https://github.com/micropython/micropython/releases/tag/v1.22.0
Scores
CVSS v3
7.3
EPSS
0.0024
EPSS Percentile
47.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Details
CWE
CWE-122
CWE-787
Status
published
Products (1)
micropython/micropython
< 1.22.0
Published
Dec 29, 2023
Tracked Since
Feb 18, 2026