|Affected Products:||ASF4 as distributed through start.atmel.com (last accessed 2020-10-21)|
|Class:||Integer Overflow or Wraparound (CWE-190)|
|Discovered by:||George Poulios|
CENSUS identified several integer overflow problems in the flash_read, flash_write and flash_append functions of the Microchip ASF4 framework. This framework is used during firmware development for Atmel (now Microchip) microcontrollers. An adversary may abuse these issues to gain unauthorized
read or write access to arbitrary pages of the flash storage, especially pages mapped at low memory addresses. As no patch is available from the vendor, CENSUS urges developers to implement a check for integer overflows
in the relevant code.
|Samsung ID:||SVE-2019-16265 (Look for SVE-2019-16265)|
|Affected Products:||Samsung mobile devices running Android O(8.0) and P(9.0) with Exynos 8895 chipset (tested on S8 and Note8 firmware)|
|Class:||"Write What Where" Condition where "What" is always zero (CWE-123)|
|Discovered by:||Aristeidis Thallas|
CENSUS identified a bug in RKP, the Samsung EL2 Hypervisor implementation. The bug allows to write the zero 64-bit value to an arbitrary memory address. For the bug to be triggered, code execution is required in the context of the EL1 kernel. The bug was verified on the Samsung S8 and Note8 devices and was fixed by Samsung in the "SMR February-2020 Release 1". The bug may allow an adversary with kernel execution access to circumvent established security controls through the corruption of device memory. Users are urged to follow the latest security updates offered by Samsung for their mobile devices.
During the security assessment of a firmware binary a number of NULL pointer dereference bugs were found
caused by newlib-nano code. newlib-nano is a C library for use
on 32-bit processors that have only a few kB of memory. It turns out that newlib-nano was part of the "GNU ARM Embedded Toolchain" that the chip manufacturer (Microchip/Atmel) delivered for application development purposes. newlib-nano inherits
code from the newlib project, which is a C library intended for use on embedded systems. All NULL pointer dereference bugs identified in newlib-nano were inherited by newlib code
and therefore CENSUS reported the respective vulnerabilities to the upstream project. Users of the newlib library
are advised to update to version 3.3.0 and make sure to build the library sources with the newlib-reent-check-verify 'configure' option enabled.