Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-8905

Опубликовано: 12 авг. 2020
Источник: nvd
CVSS3: 2.8
CVSS3: 6.5
CVSS2: 4
EPSS Низкий

Описание

A buffer length validation vulnerability in Asylo versions prior to 0.6.0 allows an attacker to read data they should not have access to. The 'enc_untrusted_recvfrom' function generates a return value which is deserialized by 'MessageReader', and copied into three different 'extents'. The length of the third 'extents' is controlled by the outside world, and not verified on copy, allowing the attacker to force Asylo to copy trusted memory data into an untrusted buffer of significantly small length.. We recommend updating Asylo to version 0.6.0 or later.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:google:asylo:*:*:*:*:*:*:*:*
Версия до 0.6.0 (исключая)

EPSS

Процентиль: 18%
0.00058
Низкий

2.8 Low

CVSS3

6.5 Medium

CVSS3

4 Medium

CVSS2

Дефекты

CWE-120
CWE-120

Связанные уязвимости

github
больше 3 лет назад

A buffer length validation vulnerability in Asylo versions prior to 0.6.0 allows an attacker to read data they should not have access to. The 'enc_untrusted_recvfrom' function generates a return value which is deserialized by 'MessageReader', and copied into three different 'extents'. The length of the third 'extents' is controlled by the outside world, and not verified on copy, allowing the attacker to force Asylo to copy trusted memory data into an untrusted buffer of significantly small length.. We recommend updating Asylo to version 0.6.0 or later.

EPSS

Процентиль: 18%
0.00058
Низкий

2.8 Low

CVSS3

6.5 Medium

CVSS3

4 Medium

CVSS2

Дефекты

CWE-120
CWE-120