Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mx6v-gg5x-68cf

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of a pointer. An attacker can use this pointer to write to arbitrary memory addresses including those within the secure enclave We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a

An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of a pointer. An attacker can use this pointer to write to arbitrary memory addresses including those within the secure enclave We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a

EPSS

Процентиль: 4%
0.00018
Низкий

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 5.3
nvd
около 5 лет назад

An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of a pointer. An attacker can use this pointer to write to arbitrary memory addresses including those within the secure enclave We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a

EPSS

Процентиль: 4%
0.00018
Низкий

Дефекты

CWE-787