Show filters
37 Total Results
Displaying 31-37 of 37
Sort by:
Attacker Value
Unknown

CVE-2018-3968

Disclosure Date: March 21, 2019 (last updated November 27, 2024)
An exploitable vulnerability exists in the verified boot protection of the Das U-Boot from version 2013.07-rc1 to 2014.07-rc2. The affected versions lack proper FIT signature enforcement, which allows an attacker to bypass U-Boot's verified boot and execute an unsigned kernel, embedded in a legacy image format. To trigger this vulnerability, a local attacker needs to be able to supply the image to boot.
Attacker Value
Unknown

CVE-2018-18439

Disclosure Date: November 20, 2018 (last updated November 27, 2024)
DENX U-Boot through 2018.09-rc1 has a remotely exploitable buffer overflow via a malicious TFTP server because TFTP traffic is mishandled. Also, local exploitation can occur via a crafted kernel image.
Attacker Value
Unknown

CVE-2018-18440

Disclosure Date: November 20, 2018 (last updated November 27, 2024)
DENX U-Boot through 2018.09-rc1 has a locally exploitable buffer overflow via a crafted kernel image because filesystem loading is mishandled.
0
Attacker Value
Unknown

Das U-Boot's AES-CBC encryption feature improperly handles an error condition a…

Disclosure Date: July 24, 2018 (last updated November 27, 2024)
Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. Devices that make use of Das U-Boot's AES-CBC encryption feature using environment encryption (i.e., setting the configuration parameter CONFIG_ENV_AES=y) read environment variables from disk as the encrypted disk image is processed. An attacker with physical access to the device can manipulate the encrypted environment data to include a crafted two-byte sequence which triggers an error in environment variable parsing. This error condition is improperly handled by Das U-Boot, resulting in an immediate process termination with a debugging message.
0
Attacker Value
Unknown

Das U-Boot's AES-CBC encryption feature uses a zero (0) initialization vector t…

Disclosure Date: July 24, 2018 (last updated November 27, 2024)
Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. For devices utilizing this environment encryption mode, U-Boot's use of a zero initialization vector may allow attacks against the underlying cryptographic implementation and allow an attacker to decrypt the data. Das U-Boot's AES-CBC encryption feature uses a zero (0) initialization vector. This allows an attacker to perform dictionary attacks on encrypted data produced by Das U-Boot to learn information about the encrypted data.
0
Attacker Value
Unknown

CVE-2018-1000205

Disclosure Date: June 26, 2018 (last updated November 26, 2024)
U-Boot contains a CWE-20: Improper Input Validation vulnerability in Verified boot signature validation that can result in Bypass verified boot. This attack appear to be exploitable via Specially crafted FIT image and special device memory functionality.
Attacker Value
Unknown

CVE-2018-12519

Disclosure Date: June 19, 2018 (last updated November 26, 2024)
An issue was discovered in ShopNx through 2017-11-17. The vulnerability allows a remote attacker to upload any malicious file to a Node.js application. An attacker can upload a malicious HTML file that contains a JavaScript payload to steal a user's credentials.
0