脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
ArduinoCore-avr has Stack-Based Buffer Overflow in WString Float/Double Constructors
脆弱性説明
ArduinoCore-avr contains the source code and configuration files of the Arduino AVR Boards platform. A vulnerability in versions prior to 1.8.7 allows an attacker to trigger a stack-based buffer overflow when converting floating-point values to strings with high precision. By passing very large `decimalPlaces` values to the affected String constructors or concat methods, the `dtostrf` function writes beyond fixed-size stack buffers, causing memory corruption and denial of service. Under specific conditions, this could enable arbitrary code execution on AVR-based Arduino boards. ### Patches - The Fix is included starting from the `1.8.7` release available from the following link [ArduinoCore-avr v1.8.7](https://github.com/arduino/ArduinoCore-avr) - The Fixing Commit is available at the following link [1a6a417f89c8901dad646efce74ae9d3ddebfd59](https://github.com/arduino/ArduinoCore-avr/pull/613/commits/1a6a417f89c8901dad646efce74ae9d3ddebfd59) ### References - [ASEC-26-001 ArduinoCore-avr vXXXX Resolves Buffer Overflow Vulnerability](https://support.arduino.cc/hc/en-us/articles/XXXXX) ### Credits - Maxime Rossi Bellom and Ramtine Tofighi Shirazi from SecMate (https://secmate.dev/)
CVSS情報
N/A
脆弱性タイプ
未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出)
脆弱性タイトル
Arduino AVR Boards 安全漏洞
脆弱性説明
Arduino AVR Boards是Arduino开源的一个软件内核。 Arduino AVR Boards 1.8.7之前版本存在安全漏洞,该漏洞源于高精度浮点数转字符串时存在栈缓冲区溢出,可能导致内存损坏、拒绝服务或任意代码执行。
CVSS情報
N/A
脆弱性タイプ
N/A