Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2025-11088

Опубликовано: 10 июн. 2025
Источник: fstec
CVSS3: 5.9
CVSS2: 4.6
EPSS Низкий

Описание

Уязвимость функции CryptHmacSign() библиотеки libtpms связана с чтением за границами буфера в памяти. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании

Вендор

Trusted Computing Group
АО «ИВК»
Сообщество свободного программного обеспечения
АО «СберТех»
ООО «НЦПР»
АО "НППКТ"

Наименование ПО

Trusted Platform Module
АЛЬТ СП 10
libtpms
Platform V SberLinux OS Server
МСВСфера
ОСОН ОСнова Оnyx

Версия ПО

2.0 (Trusted Platform Module)
- (АЛЬТ СП 10)
от 0.7.11 до 0.7.12 (libtpms)
от 0.8.9 до 0.8.10 (libtpms)
от 0.9.6 до 0.9.7 (libtpms)
от 0.10.0 до 0.10.1 (libtpms)
9.1 (Platform V SberLinux OS Server)
9.5 (МСВСфера)
9.1.1-fstec (Platform V SberLinux OS Server)
до 3.1 (ОСОН ОСнова Оnyx)

Тип ПО

ПО программно-аппаратного средства
Операционная система
Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

АО «ИВК» АЛЬТ СП 10 -
АО «СберТех» Platform V SberLinux OS Server 9.1
ООО «НЦПР» МСВСфера 9.5
АО «СберТех» Platform V SberLinux OS Server 9.1.1-fstec
АО "НППКТ" ОСОН ОСнова Оnyx до 3.1

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,6)
Средний уровень опасности (базовая оценка CVSS 3.1 составляет 5,9)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://github.com/stefanberger/libtpms/security/advisories/GHSA-25w5-6fjj-hf8g
Для ОС Альт 8 СП (релиз 10): установка обновления из публичного репозитория программного средства: https://altsp.su/obnovleniya-bezopasnosti/
Для МСВСфера: https://errata.msvsphere-os.ru/definition/9/INFCSA-2025:12100?lang=ru
Для ОСОН ОСнова Оnyx: Обновление программного обеспечения libtpms до версии 0.9.2-3.1+deb12u1

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 10%
0.00036
Низкий

5.9 Medium

CVSS3

4.6 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.9
ubuntu
10 месяцев назад

Libtpms is a library that targets the integration of TPM functionality into hypervisors, primarily into Qemu. Libtpms, which is derived from the TPM 2.0 reference implementation code published by the Trusted Computing Group, is prone to a potential out of bounds (OOB) read vulnerability. The vulnerability occurs in the ‘CryptHmacSign’ function with an inconsistent pairing of the signKey and signScheme parameters, where the signKey is ALG_KEYEDHASH key and inScheme is an ECC or RSA scheme. The reported vulnerability is in the ‘CryptHmacSign’ function, which is defined in the "Part 4: Supporting Routines – Code" document, section "7.151 - /tpm/src/crypt/CryptUtil.c ". This vulnerability can be triggered from user-mode applications by sending malicious commands to a TPM 2.0/vTPM (swtpm) whose firmware is based on an affected TCG reference implementation. The effect on libtpms is that it will cause an abort due to the detection of the out-of-bounds access, thus for example mak...

CVSS3: 5.9
redhat
10 месяцев назад

Libtpms is a library that targets the integration of TPM functionality into hypervisors, primarily into Qemu. Libtpms, which is derived from the TPM 2.0 reference implementation code published by the Trusted Computing Group, is prone to a potential out of bounds (OOB) read vulnerability. The vulnerability occurs in the ‘CryptHmacSign’ function with an inconsistent pairing of the signKey and signScheme parameters, where the signKey is ALG_KEYEDHASH key and inScheme is an ECC or RSA scheme. The reported vulnerability is in the ‘CryptHmacSign’ function, which is defined in the "Part 4: Supporting Routines – Code" document, section "7.151 - /tpm/src/crypt/CryptUtil.c ". This vulnerability can be triggered from user-mode applications by sending malicious commands to a TPM 2.0/vTPM (swtpm) whose firmware is based on an affected TCG reference implementation. The effect on libtpms is that it will cause an abort due to the detection of the out-of-bounds access, thus for example mak...

CVSS3: 5.9
nvd
10 месяцев назад

Libtpms is a library that targets the integration of TPM functionality into hypervisors, primarily into Qemu. Libtpms, which is derived from the TPM 2.0 reference implementation code published by the Trusted Computing Group, is prone to a potential out of bounds (OOB) read vulnerability. The vulnerability occurs in the ‘CryptHmacSign’ function with an inconsistent pairing of the signKey and signScheme parameters, where the signKey is ALG_KEYEDHASH key and inScheme is an ECC or RSA scheme. The reported vulnerability is in the ‘CryptHmacSign’ function, which is defined in the "Part 4: Supporting Routines – Code" document, section "7.151 - /tpm/src/crypt/CryptUtil.c ". This vulnerability can be triggered from user-mode applications by sending malicious commands to a TPM 2.0/vTPM (swtpm) whose firmware is based on an affected TCG reference implementation. The effect on libtpms is that it will cause an abort due to the detection of the out-of-bounds access, thus for example making

CVSS3: 5.9
msrc
8 месяцев назад

Libtpms contains a possible out-of-bound access and abort due to HMAC signing issue

CVSS3: 5.9
debian
10 месяцев назад

Libtpms is a library that targets the integration of TPM functionality ...

EPSS

Процентиль: 10%
0.00036
Низкий

5.9 Medium

CVSS3

4.6 Medium

CVSS2