Логотип exploitDog
bind:"BDU:2023-07640" OR bind:"CVE-2023-22745"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2023-07640" OR bind:"CVE-2023-22745"

Количество 11

Количество 11

fstec логотип

BDU:2023-07640

больше 2 лет назад

Уязвимость функций Tss2_RC_Decode и Tss2_RC_SetHandler реализации TCG TPM2 TPM2 Software Stack, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 6.4
EPSS: Низкий
redos логотип

ROS-20240611-02

около 1 года назад

Множественные уязвимости tpm2-tss

CVSS3: 6.4
EPSS: Низкий
ubuntu логотип

CVE-2023-22745

больше 2 лет назад

tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege.

CVSS3: 6.4
EPSS: Низкий
redhat логотип

CVE-2023-22745

больше 2 лет назад

tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege.

CVSS3: 6.4
EPSS: Низкий
nvd логотип

CVE-2023-22745

больше 2 лет назад

tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege.

CVSS3: 6.4
EPSS: Низкий
msrc логотип

CVE-2023-22745

больше 2 лет назад

CVSS3: 6.4
EPSS: Низкий
debian логотип

CVE-2023-22745

больше 2 лет назад

tpm2-tss is an open source software implementation of the Trusted Comp ...

CVSS3: 6.4
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0613-1

больше 2 лет назад

Security update for tpm2-0-tss

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0526-1

больше 2 лет назад

Security update for tpm2-0-tss

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7166

больше 1 года назад

ELSA-2023-7166: tpm2-tss security and enhancement update (LOW)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-6685

больше 1 года назад

ELSA-2023-6685: tpm2-tss security and enhancement update (LOW)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2023-07640

Уязвимость функций Tss2_RC_Decode и Tss2_RC_SetHandler реализации TCG TPM2 TPM2 Software Stack, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 6.4
0%
Низкий
больше 2 лет назад
redos логотип
ROS-20240611-02

Множественные уязвимости tpm2-tss

CVSS3: 6.4
около 1 года назад
ubuntu логотип
CVE-2023-22745

tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege.

CVSS3: 6.4
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-22745

tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege.

CVSS3: 6.4
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-22745

tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege.

CVSS3: 6.4
0%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 6.4
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-22745

tpm2-tss is an open source software implementation of the Trusted Comp ...

CVSS3: 6.4
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:0613-1

Security update for tpm2-0-tss

0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:0526-1

Security update for tpm2-0-tss

0%
Низкий
больше 2 лет назад
oracle-oval логотип
ELSA-2023-7166

ELSA-2023-7166: tpm2-tss security and enhancement update (LOW)

больше 1 года назад
oracle-oval логотип
ELSA-2023-6685

ELSA-2023-6685: tpm2-tss security and enhancement update (LOW)

больше 1 года назад

Уязвимостей на страницу