CVE-2020-29394

A buffer overflow in the dlt_filter_load function in dlt_common.c from dlt-daemon through 2.18.5 (GENIVI Diagnostic Log and Trace) allows arbitrary code execution because fscanf is misused (no limit on the number of characters to be read in the format argument).
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:genivi:diagnostic_log_and_trace:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:23

Type Values Removed Values Added
References () https://github.com/GENIVI/dlt-daemon/issues/274 - Exploit, Patch, Third Party Advisory () https://github.com/GENIVI/dlt-daemon/issues/274 - Exploit, Patch, Third Party Advisory
References () https://github.com/GENIVI/dlt-daemon/pull/275 - Patch, Third Party Advisory () https://github.com/GENIVI/dlt-daemon/pull/275 - Patch, Third Party Advisory
References () https://github.com/GENIVI/dlt-daemon/pull/288 - Patch, Third Party Advisory () https://github.com/GENIVI/dlt-daemon/pull/288 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/12/msg00016.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/12/msg00016.html - Mailing List, Third Party Advisory

21 Dec 2021, 16:31

Type Values Removed Values Added
CPE cpe:2.3:a:dlt-daemon_project:dlt-daemon:*:*:*:*:*:*:*:* cpe:2.3:a:genivi:diagnostic_log_and_trace:*:*:*:*:*:*:*:*

Information

Published : 2020-11-30 19:15

Updated : 2024-11-21 05:23


NVD link : CVE-2020-29394

Mitre link : CVE-2020-29394

CVE.ORG link : CVE-2020-29394


JSON object : View

Products Affected

debian

  • debian_linux

genivi

  • diagnostic_log_and_trace
CWE
CWE-787

Out-of-bounds Write