The DEF CON 27 badge allows remote attackers to exploit a buffer overflow by sending an oversized packet via the NFMI (Near Field Magnetic Induction) protocol.
References
Link | Resource |
---|---|
https://defcon.org/html/defcon-29/dc-29-speakers.html#kintigh | Exploit Third Party Advisory |
https://github.com/skintigh/defcon27_badge_sdr | |
https://defcon.org/html/defcon-29/dc-29-speakers.html#kintigh | Exploit Third Party Advisory |
https://github.com/skintigh/defcon27_badge_sdr |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://defcon.org/html/defcon-29/dc-29-speakers.html#kintigh - Exploit, Third Party Advisory | |
References | () https://github.com/skintigh/defcon27_badge_sdr - |
21 Nov 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Aug 2021, 14:43
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.8
v3 : 8.8 |
CWE | CWE-120 | |
References | (MISC) https://defcon.org/html/defcon-29/dc-29-speakers.html#kintigh - Exploit, Third Party Advisory | |
CPE | cpe:2.3:h:defcon:def_con_27:-:*:*:*:*:*:*:* cpe:2.3:o:defcon:def_con_27_firmware:-:*:*:*:*:*:*:* |
04 Aug 2021, 19:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-08-04 18:15
Updated : 2024-11-21 06:16
NVD link : CVE-2021-38111
Mitre link : CVE-2021-38111
CVE.ORG link : CVE-2021-38111
JSON object : View
Products Affected
defcon
- def_con_27
- def_con_27_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')