Описание
TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm. See Errata 1.83 of TCG standard TPM2.0
TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm. See Errata 1.83 of TCG standard TPM2.0
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-2884
- https://github.com/stefanberger/libtpms/commit/04b2d8e9afc0a9b6bffe562a23e58c0de11532d1
- https://trustedcomputinggroup.org/about/security
- https://trustedcomputinggroup.org/wp-content/uploads/TPM2.0-Library-Spec-v1.83-Errata_v1_pub.pdf
- https://trustedcomputinggroup.org/wp-content/uploads/VRT0009-Advisory-FINAL.pdf
- https://www.cve.org/CVERecord?id=CVE-2025-49133
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01209.html
- https://www.kb.cert.org/vuls/id/282450
Связанные уязвимости
TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm. See Errata Revision 1.83 and advisory TCGVRT0009 for TCG standard TPM2.0
Cert CC: CVE-2025-2884 Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation
Уязвимость функции CryptHmacSign() реализации TCG TPM2 программного стека TPM2 Software Stack, связанная с чтением памяти за пределами выделенного буфера, позволяющая нарушителю раскрыть защищаемую инфомрацию