[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2022-23645Date: (C)2022-02-22   (M)2024-04-19


swtpm is a libtpms-based TPM emulator with socket, character device, and Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are vulnerable to out-of-bounds read. A specially crafted header of swtpm's state, where the blobheader's hdrsize indicator has an invalid value, may cause an out-of-bounds access when the byte array representing the state of the TPM is accessed. This will likely crash swtpm or prevent it from starting since the state cannot be understood. Users should upgrade to swtpm v0.5.3, v0.6.2, or v0.7.1 to receive a patch. There are currently no known workarounds.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.5CVSS Score : 2.1
Exploit Score: 1.8Exploit Score: 3.9
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: NONE
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: NONEAvailability: PARTIAL
Integrity: NONE 
Availability: HIGH 
  
Reference:
FEDORA-2022-12443a525c
https://github.com/stefanberger/swtpm/commit/9f740868fc36761de27df3935513bdebf8852d19
https://github.com/stefanberger/swtpm/releases/tag/v0.5.3
https://github.com/stefanberger/swtpm/releases/tag/v0.6.2
https://github.com/stefanberger/swtpm/releases/tag/v0.7.1
https://github.com/stefanberger/swtpm/security/advisories/GHSA-2qgm-8xf4-3hqw

CWE    1
CWE-125
OVAL    10
oval:org.secpod.oval:def:507371
oval:org.secpod.oval:def:3300827
oval:org.secpod.oval:def:121724
oval:org.secpod.oval:def:87156
...

© SecPod Technologies