Vulnerability Details : CVE-2023-7158
Potential exploit
A vulnerability was found in MicroPython up to 1.21.0. It has been classified as critical. Affected is the function slice_indices of the file objslice.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.22.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-249180.
Vulnerability category: OverflowMemory Corruption
Products affected by CVE-2023-7158
- cpe:2.3:a:micropython:micropython:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-7158
0.36%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-7158
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
VulDB | |
7.3
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
3.9
|
3.4
|
VulDB | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | 2024-01-05 |
CWE ids for CVE-2023-7158
-
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().Assigned by: cna@vuldb.com (Secondary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-7158
-
https://vuldb.com/?id.249180
CVE-2023-7158: MicroPython objslice.c slice_indices heap-based overflow (Issue 13007)Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEK46QAJOXXDZOWOIE2YACUOCZFWOBCK/
[SECURITY] Fedora 38 Update: micropython-1.22.2-1.fc38 - package-announce - Fedora Mailing-Lists
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4E2HYWCZB5R4SHY4SZZZSFDMD64N4SOZ/
[SECURITY] Fedora 39 Update: micropython-1.22.2-1.fc39 - package-announce - Fedora Mailing-Lists
-
https://github.com/micropython/micropython/pull/13039
py/objslice: Validate that the argument to indices() is an integer. by dpgeorge · Pull Request #13039 · micropython/micropython · GitHubIssue Tracking
-
https://github.com/micropython/micropython/issues/13007
heap-buffer-overflow: mis-interpretation of float as int at slice_indices · Issue #13007 · micropython/micropython · GitHubExploit;Issue Tracking
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D3WWY5JY4RTJE25APB4REGDUDPATG6H7/
[SECURITY] Fedora 40 Update: micropython-1.22.2-1.fc40 - package-announce - Fedora Mailing-Lists
-
https://github.com/micropython/micropython/pull/13039/commits/f397a3ec318f3ad05aa287764ae7cef32202380f
py/objslice: Validate that the argument to indices() is an integer. by dpgeorge · Pull Request #13039 · micropython/micropython · GitHubPatch
-
https://github.com/micropython/micropython/releases/tag/v1.22.0
Release SSL support in asyncio, sorted qstr pools, common machine module bindings · micropython/micropython · GitHubRelease Notes
-
https://vuldb.com/?ctiid.249180
Permissions Required;Third Party Advisory
Jump to