Executive Summary

Informations
Name CVE-2024-53156 First vendor Publication 2024-12-24
Vendor Cve Last vendor Modification 2025-01-07

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()

I found the following bug in my fuzzer:

UBSAN: array-index-out-of-bounds in drivers/net/wireless/ath/ath9k/htc_hst.c:26:51
index 255 is out of range for type 'htc_endpoint [22]'
CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.11.0-rc6-dirty #14
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Workqueue: events request_firmware_work_func
Call Trace:

dump_stack_lvl+0x180/0x1b0
__ubsan_handle_out_of_bounds+0xd4/0x130
htc_issue_send.constprop.0+0x20c/0x230
? _raw_spin_unlock_irqrestore+0x3c/0x70
ath9k_wmi_cmd+0x41d/0x610
? mark_held_locks+0x9f/0xe0
...

Since this bug has been confirmed to be caused by insufficient verification of conn_rsp_epid, I think it would be appropriate to add a range check for conn_rsp_epid to htc_connect_service() to prevent the bug from occurring.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53156

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-129 Improper Validation of Array Index

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3670

Sources (Detail)

https://git.kernel.org/stable/c/3fe99b9690b99606d3743c9961ebee865cfa1ab8
https://git.kernel.org/stable/c/5f177fb9d01355ac183e65ad8909ea8ef734e0cf
https://git.kernel.org/stable/c/70eae50d2156cb6e078d0d78809b49bf2f4c7540
https://git.kernel.org/stable/c/8619593634cbdf5abf43f5714df49b04e4ef09ab
https://git.kernel.org/stable/c/8965db7fe2e913ee0802b05fc94c6d6aa74e0596
https://git.kernel.org/stable/c/b6551479daf2bfa80bfd5d9016b02a810e508bfb
https://git.kernel.org/stable/c/bc981179ab5d1a2715f35e3db4e4bb822bacc849
https://git.kernel.org/stable/c/c941af142200d975dd3be632aeb490f4cb91dae4
https://git.kernel.org/stable/c/cb480ae80fd4d0f1ac9e107ce799183beee5124b
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2025-02-22 03:26:47
  • Multiple Updates
2025-01-08 00:20:59
  • Multiple Updates
2025-01-07 21:20:38
  • Multiple Updates
2024-12-24 17:20:28
  • First insertion