Advisory Details

August 5th, 2024

(0Day) oFono SimToolKit Heap-based Buffer Overflow Privilege Escalation Vulnerability

ZDI-24-1086
ZDI-CAN-23459

CVE ID CVE-2024-7546
CVSS SCORE 7.8, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS oFono
AFFECTED PRODUCTS oFono
VULNERABILITY DETAILS

This vulnerability allows local attackers to execute arbitrary code on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability.

The specific flaw exists within the parsing of STK command PDUs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.

ADDITIONAL DETAILS

08/05/24 – ZDI made multiple attempts to report the vulnerability to the vendor via the oFono distribution list, Red Hat, and upstream Linux Kernel, but the vendor did not respond. The Linux Kernel informed ZDI that since it “has nothing to do with the Linux Kernel,” we should report it to the distribution list.

-- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application


DISCLOSURE TIMELINE
  • 2024-02-29 - Vulnerability reported to vendor
  • 2024-08-05 - Coordinated public release of advisory
  • 2024-08-15 - Advisory Updated
CREDIT Lucas Leong (@_wmliang_) of Trend Micro Zero Day Initiative
BACK TO ADVISORIES