CVE-2024-47248

Name
CVE-2024-47248
Description
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE. Specially crafted MESH message could result in memory corruption when non-default build configuration is used. This issue affects Apache NimBLE: through 1.7.0. Users are recommended to upgrade to version 1.8.0, which fixes the issue.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
vendor-advisory https://lists.apache.org/thread/z8m7jqh54xybf9kz8q2l3tz92zsj7tmz
security@apache.org https://github.com/apache/mynewt-nimble/commit/4f75c0b3b466186beff40e8489870c6cee076aaa
af854a3a-2127-422b-91ae-364da2661108 http://www.openwall.com/lists/oss-security/2024/11/26/2

Match rules

CPE URI Source package Min version Max version
apache-nimble >= 0 <= 1.7.0
cpe:2.3:a:apache:nimble:*:*:*:*:*:*:*:* nimble >= None < 1.8.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
nimble edge-community 0.14.2-r0 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable
nimble 3.22-community 0.14.2-r0 Jakub Jirutka <jakub@jirutka.cz> possibly vulnerable