Description
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE. Specially crafted MESH message could result in memory corruption when non-default build configuration is used. This issue affects Apache NimBLE: through 1.7.0. Users are recommended to upgrade to version 1.8.0, which fixes the issue.
References (3)
Core 3
Core References
Mailing List, Vendor Advisory
http://www.openwall.com/lists/oss-security/2024/11/26/2
Mailing List, Vendor Advisory vendor-advisory
https://lists.apache.org/thread/z8m7jqh54xybf9kz8q2l3tz92zsj7tmz
Scores
CVSS v3
6.3
EPSS
0.0005
EPSS Percentile
15.3%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-120
Status
published
Products (1)
apache/nimble
< 1.8.0
Published
Nov 26, 2024
Tracked Since
Feb 18, 2026