Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-16837

Опубликовано: 13 нояб. 2017
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6tbootWill not fix
Red Hat Enterprise Linux 7tbootWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1515198tboot: Incorrect validation of certain function pointers

EPSS

Процентиль: 31%
0.00117
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

CVSS3: 7.8
nvd
около 8 лет назад

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

CVSS3: 7.8
debian
около 8 лет назад

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are no ...

suse-cvrf
около 8 лет назад

Security update for tboot

suse-cvrf
около 8 лет назад

Recommended update for tboot

EPSS

Процентиль: 31%
0.00117
Низкий

5.5 Medium

CVSS3