CryptoLib Vulnerable to Heap Buffer Overflow in MariaDB SA Hexstring Conversion
Description
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the convert_hexstring_to_byte_array() function in the MariaDB SA interface writes decoded bytes into a caller-provided buffer without any capacity check. When importing SA fields from the database (e.g., IV, ARSN, ABM), a malformed or oversized hex string in the database can overflow the destination buffer, corrupting adjacent heap memory. This issue has been patched in version 1.4.3.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/nasa/CryptoLib/commit/2372efd3da1ccb226b4297222e25f41ecc84821dmitrex_refsource_MISC
- github.com/nasa/CryptoLib/releases/tag/v1.4.3mitrex_refsource_MISC
- github.com/nasa/CryptoLib/security/advisories/GHSA-3m35-m689-h29xmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.