Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9jxq-5x44-gx23

Опубликовано: 14 фев. 2025
Источник: github
Github: Прошло ревью
CVSS3: 4.3

Описание

Keylime registrar is vulnerable to Denial-of-Service attack when updated to version 7.12.0

Impact

The Keylime registrar implemented more strict type checking on version 7.12.0. As a result, when updated to version 7.12.0, the registrar will not accept the format of the data previously stored in the database by versions >= 7.8.0, raising an exception.

This makes the Keylime registrar vulnerable to a Denial-of-Service attack in an update scenario, as an attacker could populate the registrar database by creating multiple valid agent registrations with different UUIDs while the version is still < 7.12.0. Then, when the Keylime registrar is updated to the 7.12.0 version, any query to the database matching any of the entries populated by the attacker will result in failure.

Patches

Users should upgrade to versions >= 7.12.1

Workarounds

  • Remove the registrar database and re-register all agents

Credit

Reported by: Anderson Toshiyuki Sasaki/@ansasaki Patched by: Anderson Toshiyuki Sasaki/@ansasaki

Пакеты

Наименование

keylime

pip
Затронутые версииВерсия исправления

= 7.12.0

7.12.1

EPSS

Процентиль: 27%
0.00097
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-1287
CWE-704

Связанные уязвимости

CVSS3: 4.3
ubuntu
10 месяцев назад

A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions store agent registration data as bytes, whereas the updated registrar expects str. This issue leads to an exception when processing agent registration requests, causing the agent to fail.

CVSS3: 4.3
redhat
11 месяцев назад

A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions store agent registration data as bytes, whereas the updated registrar expects str. This issue leads to an exception when processing agent registration requests, causing the agent to fail.

CVSS3: 4.3
nvd
10 месяцев назад

A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions store agent registration data as bytes, whereas the updated registrar expects str. This issue leads to an exception when processing agent registration requests, causing the agent to fail.

EPSS

Процентиль: 27%
0.00097
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-1287
CWE-704