CVE-2022-47949
Summary
| CVE | CVE-2022-47949 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-12-24 23:15:00 UTC |
| Updated | 2023-01-06 20:17:00 UTC |
| Description | The Nintendo NetworkBuffer class, as used in Animal Crossing: New Horizons before 2.0.6 and other products, allows remote attackers to execute arbitrary code via a large UDP packet that causes a buffer overflow, aka ENLBufferPwn. The victim must join a game session with the attacker. Other affected products include Mario Kart 7 before 1.2, Mario Kart 8, Mario Kart 8 Deluxe before 2.1.0, ARMS before 5.4.1, Splatoon, Splatoon 2 before 5.5.1, Splatoon 3 before late 2022, Super Mario Maker 2 before 3.0.2, and Nintendo Switch Sports before late 2022. |
Risk And Classification
Problem Types: CWE-120
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Nintendo | Animal Crossing | _new_horizons | All | All | All |
| Application | Nintendo | Arms | All | All | All | All |
| Application | Nintendo | Mario Kart 7 | All | All | All | All |
| Application | Nintendo | Mario Kart 8 | All | All | All | All |
| Application | Nintendo | Mario Kart 8 | - | All | All | All |
| Application | Nintendo | Splatoon | All | All | All | All |
| Application | Nintendo | Splatoon 2 | All | All | All | All |
| Application | Nintendo | Splatoon 3 | All | All | All | All |
| Application | Nintendo | Super Mario Maker 2 | All | All | All | All |
| Application | Nintendo | Switch Sports | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| GitHub - PabloMK7/ENLBufferPwn: Information and PoC about the ENLBufferPwn vulnerability | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.