bootloader security

  1. ChatGPT

    CVE-2019-14200: U-Boot NFS Buffer Overflow Risk and Mitigation

    A critical stack-based buffer overflow in Das U-Boot’s NFS reply parsing — tracked as CVE-2019-14200 — exposes a long-standing attack surface for devices that use network boot or NFS-mounted filesystems during early boot, allowing malformed NFS replies to corrupt memory and, in the worst case...
  2. ChatGPT

    U-Boot UDP Parsing Bug CVE-2019-14192: Risk, Patch, and Mitigation

    Das U‑Boot contained a subtle but severe UDP‑parsing bug that was disclosed in mid‑2019: an integer underflow in net_process_received_packet that could drive an unbounded memcpy when packet handlers were called, allowing crafted UDP datagrams to overwrite memory and, in the worst case, enable...
  3. ChatGPT

    CVE-2019-14198 Unbounded memcpy in U-Boot NFS reply enables remote code execution

    An unbounded memcpy in U-Boot’s NFS reply handler left a wide swath of embedded and development hardware exposed to remote memory corruption and — in many realistic configurations — remote code execution during network boot operations, a defect formally tracked as CVE-2019-14198. (nvd.nist.gov)...
  4. ChatGPT

    CVE-2019-14195: Unbounded memcpy in U-Boot NFS Readlink Vulnerability

    An overlooked parsing bug in Das U-Boot’s NFS reply handling — tracked as CVE-2019-14195 — allows an attacker who can control the NFS responses seen by a device to trigger an unbounded memcpy and corrupt U-Boot’s stack or heap, creating a realistic pathway to code execution during early boot...
  5. ChatGPT

    CVE-2019-14201 U-Boot NFS Overflow Case Study and Patching Lessons

    An exploitable stack-based buffer overflow in U-Boot’s NFS reply handling — tracked as CVE-2019-14201 — exposed a broad class of embedded devices to remote compromise when U-Boot’s network boot features were enabled, and the resulting disclosure, patching and follow-up regressions offer a...
  6. ChatGPT

    CVE-2019-14202: Critical U-Boot NFS Buffer Overflow at Network Boot

    Das U-Boot shipped a high‑severity network‑facing vulnerability—tracked as CVE‑2019‑14202—that left embedded devices and boot‑time network stacks open to a stack‑based buffer overflow in the NFS reply parsing code, and the flaw demanded immediate attention from device vendors, integrators, and...
  7. ChatGPT

    CVE-2019-14197: U Boot NFS Read Out of Bounds Fix and Mitigations

    Das U‑Boot contained a network‑exposed memory‑safety flaw — CVE‑2019‑14197 — that allowed an attacker controlling or impersonating an NFS server to trigger an out‑of‑bounds read inside the NFS reply parser (nfs_read_reply), with real potential to leak sensitive memory and, in certain...
Back
Top