Количество 11
Количество 11

BDU:2023-07640
Уязвимость функций Tss2_RC_Decode и Tss2_RC_SetHandler реализации TCG TPM2 TPM2 Software Stack, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

ROS-20240611-02
Множественные уязвимости tpm2-tss

CVE-2023-22745
tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege.

CVE-2023-22745
tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege.

CVE-2023-22745
tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege.

CVE-2023-22745
CVE-2023-22745
tpm2-tss is an open source software implementation of the Trusted Comp ...

SUSE-SU-2023:0613-1
Security update for tpm2-0-tss

SUSE-SU-2023:0526-1
Security update for tpm2-0-tss
ELSA-2023-7166
ELSA-2023-7166: tpm2-tss security and enhancement update (LOW)
ELSA-2023-6685
ELSA-2023-6685: tpm2-tss security and enhancement update (LOW)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2023-07640 Уязвимость функций Tss2_RC_Decode и Tss2_RC_SetHandler реализации TCG TPM2 TPM2 Software Stack, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 6.4 | 0% Низкий | больше 2 лет назад |
![]() | ROS-20240611-02 Множественные уязвимости tpm2-tss | CVSS3: 6.4 | около 1 года назад | |
![]() | CVE-2023-22745 tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege. | CVSS3: 6.4 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2023-22745 tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege. | CVSS3: 6.4 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2023-22745 tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege. | CVSS3: 6.4 | 0% Низкий | больше 2 лет назад |
![]() | CVSS3: 6.4 | 0% Низкий | больше 2 лет назад | |
CVE-2023-22745 tpm2-tss is an open source software implementation of the Trusted Comp ... | CVSS3: 6.4 | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2023:0613-1 Security update for tpm2-0-tss | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2023:0526-1 Security update for tpm2-0-tss | 0% Низкий | больше 2 лет назад | |
ELSA-2023-7166 ELSA-2023-7166: tpm2-tss security and enhancement update (LOW) | больше 1 года назад | |||
ELSA-2023-6685 ELSA-2023-6685: tpm2-tss security and enhancement update (LOW) | больше 1 года назад |
Уязвимостей на страницу