CVE-2024-47248

medium

Description

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE. Specially crafted MESH message could result in memory corruption when non-default build configuration is used. This issue affects Apache NimBLE: through 1.7.0. Users are recommended to upgrade to version 1.8.0, which fixes the issue.

References

https://lists.apache.org/thread/z8m7jqh54xybf9kz8q2l3tz92zsj7tmz

https://github.com/apache/mynewt-nimble/commit/4f75c0b3b466186beff40e8489870c6cee076aaa

http://www.openwall.com/lists/oss-security/2024/11/26/2

Details

Source: Mitre, NVD

Published: 2024-11-26

Updated: 2025-07-08

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 6.3

Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Severity: Medium

EPSS

EPSS: 0.00033