Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-18614

EPSS 0.05% · P17
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-18614

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
On the Cypress CYW20735 evaluation board, any data that exceeds 384 bytes is copied and causes an overflow. This is because the maximum BLOC buffer size for sending and receiving data is set to 384 bytes, but everything else is still configured to the usual size of 1092 (which was used for everything in the previous CYW20719 and later CYW20819 evaluation board). To trigger the overflow, an attacker can either send packets over the air or as unprivileged local user. Over the air, the minimal PoC is sending "l2ping -s 600" to the target address prior to any pairing. Locally, the buffer overflow is immediately triggered by opening an ACL or SCO connection to a headset. This occurs because, in WICED Studio 6.2 and 6.4, BT_ACL_HOST_TO_DEVICE_DEFAULT_SIZE and BT_ACL_DEVICE_TO_HOST_DEFAULT_SIZE are set to 384.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cypress Semiconductor CYW20735 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cypress Semiconductor CYW20735是美国赛普拉斯半导体(Cypress Semiconductor)公司的一款单芯片蓝牙收发器。 Cypress CYW20735中存在缓冲区错误漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2019-18614

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-18614

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-06-16 · 45 CVEs total

CVE-2020-8542Open-Xchange OX App Suite 跨站脚本漏洞
CVE-2020-0235Google Android 缓冲区错误漏洞
CVE-2020-0223Google Android 安全漏洞
CVE-2020-0232Android Kernel Airbrush 资源管理错误漏洞
CVE-2020-11841Micro Focus ArcSight Management Center 信息泄露漏洞
CVE-2020-11838Micro Focus ArcSight Management Center 跨站脚本漏洞
CVE-2020-11840Micro Focus ArcSight Management Center 信息泄露漏洞
CVE-2020-9522Micro Focus ArcSight Enterprise Security Manager 跨站脚本漏洞
CVE-2020-13431I2P 安全漏洞
CVE-2020-9296Netflix Titus 注入漏洞
CVE-2020-8543Open-Xchange OX App Suite 资源管理错误漏洞
CVE-2020-8541Open-Xchange OX App Suite 代码问题漏洞
CVE-2020-8544Open-Xchange OX App Suite 代码问题漏洞
CVE-2020-14195FasterXML jackson-databind 代码问题漏洞
CVE-2020-14199Trezor Model T数据伪造问题漏洞
CVE-2020-7492Schneider Electric GP-Pro EX 安全漏洞
CVE-2020-7493Schneider Electric EcoStruxure Operator Terminal Expert SQL注入漏洞
CVE-2020-7494Schneider Electric EcoStruxure Operator Terminal Expert 路径遍历漏洞
CVE-2020-7495Schneider Electric EcoStruxure Operator Terminal Expert 路径遍历漏洞
CVE-2020-7496Schneider Electric EcoStruxure Operator Terminal Expert 参数注入漏洞

Showing top 20 of 45 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2019-18614

No comments yet


Leave a comment