CVE-2020-4060

CVSS V2 Medium 4 CVSS V3 Medium 5
Description
In LoRa Basics Station before 2.0.4, there is a Use After Free vulnerability that leads to memory corruption. This bug is triggered on 32-bit machines when the CUPS server responds with a message (https://doc.sm.tc/station/cupsproto.html#http-post-response) where the signature length is larger than 2 GByte (never happens in practice), or the response is crafted specifically to trigger this issue (i.e. the length signature field indicates a value larger than (2**31)-1 although the signature actually does not contain that much data). In such a scenario, on 32 bit machines, Basic Station would execute a code path, where a piece of memory is accessed after it has been freed, causing the process to crash and restarted again. The CUPS transaction is typically mutually authenticated over TLS. Therefore, in order to trigger this vulnerability, the attacker would have to gain access to the CUPS server first. If the user chose to operate without authentication over TLS but yet is concerned about this vulnerability, one possible workaround is to enable TLS authentication. This has been fixed in 2.0.4.
Overview
  • CVE ID
  • CVE-2020-4060
  • Assigner
  • security-advisories@github.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2020-06-22T16:15:11
  • Last Modified Date
  • 2020-07-01T14:31:51
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:semtech:lora_basics_station:*:*:*:*:*:*:*:* 1 OR 2.0.4
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:S/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • SINGLE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 4
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • CHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • LOW
  • Base Score
  • 5
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 3.1
  • Impact Score
  • 1.4
References
Reference URL Reference Tags
https://github.com/lorabasics/basicstation/security/advisories/GHSA-v9ph-r496-4m2j Mitigation Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 16:41:41 Added to TrackCVE
2022-12-04 18:34:30 2020-06-22T16:15Z 2020-06-22T16:15:11 CVE Published Date updated
2022-12-04 18:34:30 2020-07-01T14:31:51 CVE Modified Date updated
2022-12-04 18:34:30 Analyzed Vulnerability Status updated