Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-16837

Опубликовано: 16 нояб. 2017
Источник: debian

Описание

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tbootnot-affectedpackage

Примечания

  • https://sourceforge.net/p/tboot/code/ci/521c58e51eb5be105a29983742850e72c44ed80e/

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

CVSS3: 5.5
redhat
около 8 лет назад

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

CVSS3: 7.8
nvd
около 8 лет назад

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

suse-cvrf
около 8 лет назад

Security update for tboot

suse-cvrf
около 8 лет назад

Recommended update for tboot