CVE-2020-12885

CVSS V2 High 7.8 CVSS V3 High 7.5
Description
An infinite loop was discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse_multiple_options() parses CoAP options in a while loop. This loop's exit condition is computed using the previously allocated heap memory required for storing the result of parsing multiple options. If the input heap memory calculation results in zero bytes, the loop exit condition is never met and the loop is not terminated. As a result, the packet parsing function never exits, leading to resource consumption.
Overview
  • CVE ID
  • CVE-2020-12885
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2020-06-18T19:15:10
  • Last Modified Date
  • 2020-06-25T14:35:22
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:N/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 7.8
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 7.5
  • Base Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 3.6
References
Reference URL Reference Tags
https://github.com/ARMmbed/mbed-os/issues/12929 Third Party Advisory
https://github.com/ARMmbed/mbed-coap/pull/116 Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 16:42:02 Added to TrackCVE
2022-12-04 18:18:39 2020-06-18T19:15Z 2020-06-18T19:15:10 CVE Published Date updated
2022-12-04 18:18:39 2020-06-25T14:35:22 CVE Modified Date updated
2022-12-04 18:18:39 Analyzed Vulnerability Status updated