PT-2026-36519 · Uds-C+1 · Uds-C+1
Feng Ning
·
Published
2026-05-01
·
Updated
2026-05-01
·
CVE-2026-42485
CVSS v3.1
7.5
High
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Name of the Vulnerable Software and Affected Versions
agl-service-can-low-level (affected versions not specified)
Description
A stack buffer overflow exists in the uds-c library. The
send diagnostic request() function in uds.c allocates a 6-byte stack buffer but copies up to 7 bytes via memcpy at an offset of 1+pid length (2-3 bytes), allowing 1-4 bytes of controlled stack overflow. This occurs because the payload length variable lacks a bounds check against the destination buffer. On 32-bit ARM automotive ECUs without stack canaries (security mechanisms that detect stack buffer overflows), this can lead to return address overwrite and remote code execution.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Stack Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Agl-Service-Can-Low-Level
Uds-C