Логотип exploitDog
bind:"CVE-2017-16837"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2017-16837"

Количество 7

Количество 7

ubuntu логотип

CVE-2017-16837

около 8 лет назад

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2017-16837

около 8 лет назад

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2017-16837

около 8 лет назад

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2017-16837

около 8 лет назад

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are no ...

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:3100-1

около 8 лет назад

Security update for tboot

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:3090-1

около 8 лет назад

Recommended update for tboot

EPSS: Низкий
github логотип

GHSA-86m6-cj8w-2c48

больше 3 лет назад

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-16837

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

CVSS3: 7.8
0%
Низкий
около 8 лет назад
redhat логотип
CVE-2017-16837

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

CVSS3: 5.5
0%
Низкий
около 8 лет назад
nvd логотип
CVE-2017-16837

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

CVSS3: 7.8
0%
Низкий
около 8 лет назад
debian логотип
CVE-2017-16837

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are no ...

CVSS3: 7.8
0%
Низкий
около 8 лет назад
suse-cvrf логотип
openSUSE-SU-2017:3100-1

Security update for tboot

0%
Низкий
около 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:3090-1

Recommended update for tboot

0%
Низкий
около 8 лет назад
github логотип
GHSA-86m6-cj8w-2c48

Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу