Vulnerability Description
zephyr-rtos version 1.12.0 contains a NULL base pointer reference vulnerability in sys_ring_buf_put(), sys_ring_buf_get() that can result in CPU Page Fault (error code 0x00000010). This attack appear to be exploitable via a malicious application call the vulnerable kernel APIs (system sys_ring_buf_get() and sys_ring_buf_put).
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zephyrproject | Zephyr | 1.12.0 |
Related Weaknesses (CWE)
References
- https://github.com/zephyrproject-rtos/zephyr/issues/7638ExploitThird Party Advisory
- https://github.com/zephyrproject-rtos/zephyr/issues/7638ExploitThird Party Advisory
FAQ
What is CVE-2018-1000800?
CVE-2018-1000800 is a vulnerability with a CVSS score of 9.8 (CRITICAL). zephyr-rtos version 1.12.0 contains a NULL base pointer reference vulnerability in sys_ring_buf_put(), sys_ring_buf_get() that can result in CPU Page Fault (error code 0x00000010). This attack appear ...
How severe is CVE-2018-1000800?
CVE-2018-1000800 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-1000800?
Check the references section above for vendor advisories and patch information. Affected products include: Zephyrproject Zephyr.