Buffer Copy without Checking Size of Input ('Classic...
Moderate severity
Unreviewed
Published
Nov 26, 2024
to the GitHub Advisory Database
•
Updated Dec 6, 2024
Description
Published by the National Vulnerability Database
Nov 26, 2024
Published to the GitHub Advisory Database
Nov 26, 2024
Last updated
Dec 6, 2024
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE.
Specially crafted MESH message could result in memory corruption when non-default build configuration is used.
This issue affects Apache NimBLE: through 1.7.0.
Users are recommended to upgrade to version 1.8.0, which fixes the issue.
References