Enviar #584129: RT-Thread 5.1.0 Improper Handling of Parametersinformación

TítuloRT-Thread 5.1.0 Improper Handling of Parameters
DescripciónA vulnerability in the sys_sendto system call in the Smart version of RT-Thread v5.1.0. This vulnerability stems from insufficient pointer validation in the sockaddr_tolwip function, which is called by sys_sendto. The code only checks if the pointer is NULL but fails to verify whether the pointer points to valid memory. If exploited by a compromised user thread, this issue could lead to severe security consequences, including kernel crashes and potential unauthorized memory access.
Fuente⚠️ https://github.com/RT-Thread/rt-thread/issues/10299
Usuario
 Zephyr Saxon (UID 80853)
Sumisión2025-05-24 04:49 (hace 11 meses)
Moderación2025-06-08 19:36 (16 days later)
EstadoAceptado
Entrada de VulDB311626 [RT-Thread 5.1.0 lwp_syscall.c csys_sendto denegación de servicio]
Puntos20

Want to know what is going to be exploited?

We predict KEV entries!