Vulnerabilites related to Google LLC - Asylo
CVE-2020-8941 (GCVE-0-2020-8941)
Vulnerability from cvelistv5
Published
2020-12-15 14:55
Modified
2024-08-04 10:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Overflow
Summary
An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_inet_pton using an attacker controlled klinux_addr_buffer parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading past commit 8fed5e334131abaf9c5e17307642fbf6ce4a57ec
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Google LLC | Asylo |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:10.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/google/asylo/commit/8fed5e334131abaf9c5e17307642fbf6ce4a57ec" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Asylo", "vendor": "Google LLC", "versions": [ { "lessThanOrEqual": "0.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "en", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "en", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "en", "value": "Kang Li (Baidu Security)" } ], "descriptions": [ { "lang": "en", "value": "An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_inet_pton using an attacker controlled klinux_addr_buffer parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading past commit 8fed5e334131abaf9c5e17307642fbf6ce4a57ec" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-15T14:55:37", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/google/asylo/commit/8fed5e334131abaf9c5e17307642fbf6ce4a57ec" } ], "solutions": [ { "lang": "en", "value": "We recommend upgrading or past commit 8fed5e334131abaf9c5e17307642fbf6ce4a57ec" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unchecked buffer overrun in enc_untrusted_inet_pton", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2020-8941", "STATE": "PUBLIC", "TITLE": "Unchecked buffer overrun in enc_untrusted_inet_pton" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Asylo", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "0.6.0" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "credit": [ { "lang": "eng", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "eng", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "eng", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "eng", "value": "Kang Li (Baidu Security)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_inet_pton using an attacker controlled klinux_addr_buffer parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading past commit 8fed5e334131abaf9c5e17307642fbf6ce4a57ec" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-120 Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/google/asylo/commit/8fed5e334131abaf9c5e17307642fbf6ce4a57ec", "refsource": "CONFIRM", "url": "https://github.com/google/asylo/commit/8fed5e334131abaf9c5e17307642fbf6ce4a57ec" } ] }, "solution": [ { "lang": "en", "value": "We recommend upgrading or past commit 8fed5e334131abaf9c5e17307642fbf6ce4a57ec" } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2020-8941", "datePublished": "2020-12-15T14:55:37", "dateReserved": "2020-02-12T00:00:00", "dateUpdated": "2024-08-04T10:12:10.981Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8940 (GCVE-0-2020-8940)
Vulnerability from cvelistv5
Published
2020-12-15 14:55
Modified
2024-08-04 10:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Overflow
Summary
An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_recvmsg using an attacker controlled result parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading or past commit fa6485c5d16a7355eab047d4a44345a73bc9131e
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Google LLC | Asylo |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:10.977Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/google/asylo/commit/fa6485c5d16a7355eab047d4a44345a73bc9131e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Asylo", "vendor": "Google LLC", "versions": [ { "lessThanOrEqual": "0.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "en", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "en", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "en", "value": "Kang Li (Baidu Security)" } ], "descriptions": [ { "lang": "en", "value": "An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_recvmsg using an attacker controlled result parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading or past commit fa6485c5d16a7355eab047d4a44345a73bc9131e" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-15T14:55:36", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/google/asylo/commit/fa6485c5d16a7355eab047d4a44345a73bc9131e" } ], "solutions": [ { "lang": "en", "value": "We recommend upgrading or past commit fa6485c5d16a7355eab047d4a44345a73bc9131e" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unchecked buffer overrun in enc_untrusted_recvmsg", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2020-8940", "STATE": "PUBLIC", "TITLE": "Unchecked buffer overrun in enc_untrusted_recvmsg" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Asylo", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "0.6.0" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "credit": [ { "lang": "eng", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "eng", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "eng", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "eng", "value": "Kang Li (Baidu Security)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_recvmsg using an attacker controlled result parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading or past commit fa6485c5d16a7355eab047d4a44345a73bc9131e" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-120 Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/google/asylo/commit/fa6485c5d16a7355eab047d4a44345a73bc9131e", "refsource": "CONFIRM", "url": "https://github.com/google/asylo/commit/fa6485c5d16a7355eab047d4a44345a73bc9131e" } ] }, "solution": [ { "lang": "en", "value": "We recommend upgrading or past commit fa6485c5d16a7355eab047d4a44345a73bc9131e" } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2020-8940", "datePublished": "2020-12-15T14:55:36", "dateReserved": "2020-02-12T00:00:00", "dateUpdated": "2024-08-04T10:12:10.977Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-22550 (GCVE-0-2021-22550)
Vulnerability from cvelistv5
Published
2021-06-08 13:15
Modified
2024-09-16 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-823 - Use of Out-of-range Pointer Offset
Summary
An attacker can modify the pointers in enclave memory to overwrite arbitrary memory addresses within the secure enclave. It is recommended to update past 0.6.3 or git commit https://github.com/google/asylo/commit/a47ef55db2337d29de19c50cd29b0deb2871d31c
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Google LLC | Asylo |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.683Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/google/asylo/commit/a47ef55db2337d29de19c50cd29b0deb2871d31c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Asylo", "vendor": "Google LLC", "versions": [ { "lessThanOrEqual": "0.6.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "en", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "en", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "en", "value": "Kang Li (Baidu Security)" } ], "datePublic": "2021-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An attacker can modify the pointers in enclave memory to overwrite arbitrary memory addresses within the secure enclave. It is recommended to update past 0.6.3 or git commit https://github.com/google/asylo/commit/a47ef55db2337d29de19c50cd29b0deb2871d31c" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-823", "description": "CWE-823 Use of Out-of-range Pointer Offset", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-08T13:15:14", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/google/asylo/commit/a47ef55db2337d29de19c50cd29b0deb2871d31c" } ], "source": { "discovery": "EXTERNAL" }, "title": "Enclave memory overwrite/overread vulnerability in Asylo UntrustedCacheMalloc::GetBuffer", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "DATE_PUBLIC": "2021-03-12T11:00:00.000Z", "ID": "CVE-2021-22550", "STATE": "PUBLIC", "TITLE": "Enclave memory overwrite/overread vulnerability in Asylo UntrustedCacheMalloc::GetBuffer" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Asylo", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "0.6.1" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "credit": [ { "lang": "eng", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "eng", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "eng", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "eng", "value": "Kang Li (Baidu Security)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An attacker can modify the pointers in enclave memory to overwrite arbitrary memory addresses within the secure enclave. It is recommended to update past 0.6.3 or git commit https://github.com/google/asylo/commit/a47ef55db2337d29de19c50cd29b0deb2871d31c" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-823 Use of Out-of-range Pointer Offset" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/google/asylo/commit/a47ef55db2337d29de19c50cd29b0deb2871d31c", "refsource": "MISC", "url": "https://github.com/google/asylo/commit/a47ef55db2337d29de19c50cd29b0deb2871d31c" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2021-22550", "datePublished": "2021-06-08T13:15:14.762702Z", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-09-16T23:10:32.801Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8936 (GCVE-0-2020-8936)
Vulnerability from cvelistv5
Published
2020-12-15 14:55
Modified
2024-08-04 10:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to UntrustedCall. UntrustedCall failed to validate the buffer range within sgx_params and allowed the host to return a pointer that was an address within the enclave memory. This allowed an attacker to read memory values from within the enclave.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Google LLC | Asylo |
Version: 0.6.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:11.009Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/google/asylo/commit/83036fd841d33baa7e039f842d131aa7881fdcc2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Asylo", "vendor": "Google LLC", "versions": [ { "lessThanOrEqual": "0.6.0", "status": "affected", "version": "0.6.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "en", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "en", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "en", "value": "Kang Li (Baidu Security)" } ], "descriptions": [ { "lang": "en", "value": "An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to UntrustedCall. UntrustedCall failed to validate the buffer range within sgx_params and allowed the host to return a pointer that was an address within the enclave memory. This allowed an attacker to read memory values from within the enclave." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-15T14:55:33", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/google/asylo/commit/83036fd841d33baa7e039f842d131aa7881fdcc2" } ], "solutions": [ { "lang": "en", "value": "Upgrade past commit 83036fd841d33baa7e039f842d131aa7881fdcc2" } ], "source": { "discovery": "EXTERNAL" }, "title": "Arbitrary enclave memory overwrite vulnerability in ECall ecall_restore", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2020-8936", "STATE": "PUBLIC", "TITLE": "Arbitrary enclave memory overwrite vulnerability in ECall ecall_restore" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Asylo", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "0.6.0", "version_value": "0.6.0" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "credit": [ { "lang": "eng", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "eng", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "eng", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "eng", "value": "Kang Li (Baidu Security)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to UntrustedCall. UntrustedCall failed to validate the buffer range within sgx_params and allowed the host to return a pointer that was an address within the enclave memory. This allowed an attacker to read memory values from within the enclave." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125 Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/google/asylo/commit/83036fd841d33baa7e039f842d131aa7881fdcc2", "refsource": "CONFIRM", "url": "https://github.com/google/asylo/commit/83036fd841d33baa7e039f842d131aa7881fdcc2" } ] }, "solution": [ { "lang": "en", "value": "Upgrade past commit 83036fd841d33baa7e039f842d131aa7881fdcc2" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2020-8936", "datePublished": "2020-12-15T14:55:33", "dateReserved": "2020-02-12T00:00:00", "dateUpdated": "2024-08-04T10:12:11.009Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8942 (GCVE-0-2020-8942)
Vulnerability from cvelistv5
Published
2020-12-15 14:55
Modified
2024-08-04 10:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Overflow
Summary
An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_read whose return size was not validated against the requrested size. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading past commit b1d120a2c7d7446d2cc58d517e20a1b184b82200
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Google LLC | Asylo |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:11.000Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/google/asylo/commit/b1d120a2c7d7446d2cc58d517e20a1b184b82200" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Asylo", "vendor": "Google LLC", "versions": [ { "lessThanOrEqual": "0.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "en", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "en", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "en", "value": "Kang Li (Baidu Security)" } ], "descriptions": [ { "lang": "en", "value": "An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_read whose return size was not validated against the requrested size. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading past commit b1d120a2c7d7446d2cc58d517e20a1b184b82200" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-15T14:55:37", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/google/asylo/commit/b1d120a2c7d7446d2cc58d517e20a1b184b82200" } ], "solutions": [ { "lang": "en", "value": "We recommend upgrading past commit b1d120a2c7d7446d2cc58d517e20a1b184b82200" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unchecked buffer overrun in enc_untrusted_read", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2020-8942", "STATE": "PUBLIC", "TITLE": "Unchecked buffer overrun in enc_untrusted_read" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Asylo", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "0.6.0" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "credit": [ { "lang": "eng", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "eng", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "eng", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "eng", "value": "Kang Li (Baidu Security)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_read whose return size was not validated against the requrested size. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading past commit b1d120a2c7d7446d2cc58d517e20a1b184b82200" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-120 Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/google/asylo/commit/b1d120a2c7d7446d2cc58d517e20a1b184b82200", "refsource": "CONFIRM", "url": "https://github.com/google/asylo/commit/b1d120a2c7d7446d2cc58d517e20a1b184b82200" } ] }, "solution": [ { "lang": "en", "value": "We recommend upgrading past commit b1d120a2c7d7446d2cc58d517e20a1b184b82200" } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2020-8942", "datePublished": "2020-12-15T14:55:38", "dateReserved": "2020-02-12T00:00:00", "dateUpdated": "2024-08-04T10:12:11.000Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-22549 (GCVE-0-2021-22549)
Vulnerability from cvelistv5
Published
2021-06-08 13:15
Modified
2024-09-17 02:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-823 - Use of Out-of-range Pointer Offset
Summary
An attacker can modify the address to point to trusted memory to overwrite arbitrary trusted memory. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Google LLC | Asylo |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/google/asylo/commit/ecfcd0008b6f8f63c6fa3cc1b62fcd4a52f2c0ad" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Asylo", "vendor": "Google LLC", "versions": [ { "lessThanOrEqual": "0.6.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "en", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "en", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "en", "value": "Kang Li (Baidu Security)" } ], "datePublic": "2021-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An attacker can modify the address to point to trusted memory to overwrite arbitrary trusted memory. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-823", "description": "CWE-823 Use of Out-of-range Pointer Offset", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-08T13:15:14", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/google/asylo/commit/ecfcd0008b6f8f63c6fa3cc1b62fcd4a52f2c0ad" } ], "source": { "discovery": "EXTERNAL" }, "title": "Arbitrary enclave memory overwrite vulnerability in Asylo TrustedPrimitives::UntrustedCall", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "DATE_PUBLIC": "2021-03-12T11:00:00.000Z", "ID": "CVE-2021-22549", "STATE": "PUBLIC", "TITLE": "Arbitrary enclave memory overwrite vulnerability in Asylo TrustedPrimitives::UntrustedCall" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Asylo", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "0.6.2" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "credit": [ { "lang": "eng", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "eng", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "eng", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "eng", "value": "Kang Li (Baidu Security)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An attacker can modify the address to point to trusted memory to overwrite arbitrary trusted memory. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-823 Use of Out-of-range Pointer Offset" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/google/asylo/commit/ecfcd0008b6f8f63c6fa3cc1b62fcd4a52f2c0ad", "refsource": "MISC", "url": "https://github.com/google/asylo/commit/ecfcd0008b6f8f63c6fa3cc1b62fcd4a52f2c0ad" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2021-22549", "datePublished": "2021-06-08T13:15:14.120892Z", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-09-17T02:42:42.905Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8935 (GCVE-0-2020-8935)
Vulnerability from cvelistv5
Published
2020-12-15 14:55
Modified
2024-08-04 10:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Arbitrary Memory overwrite in Ecall_restore
Summary
An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allow an attacker to make an Ecall_restore function call to reallocate untrusted code and overwrite sections of the Enclave memory address. We recommend updating your library.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Google LLC | Asylo |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:11.011Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/google/asylo/commit/ed0926bff0e423cd122a18b3d2fc772817f66825" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Asylo", "vendor": "Google LLC", "versions": [ { "lessThanOrEqual": "0.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "en", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "en", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "en", "value": "Kang Li (Baidu Security)" } ], "descriptions": [ { "lang": "en", "value": "An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allow an attacker to make an Ecall_restore function call to reallocate untrusted code and overwrite sections of the Enclave memory address. We recommend updating your library." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary Memory overwrite in Ecall_restore", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-15T14:55:32", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/google/asylo/commit/ed0926bff0e423cd122a18b3d2fc772817f66825" } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2020-8935", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Asylo", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "0.6.0" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "credit": [ { "lang": "eng", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "eng", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "eng", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "eng", "value": "Kang Li (Baidu Security)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allow an attacker to make an Ecall_restore function call to reallocate untrusted code and overwrite sections of the Enclave memory address. We recommend updating your library." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Arbitrary Memory overwrite in Ecall_restore" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/google/asylo/commit/ed0926bff0e423cd122a18b3d2fc772817f66825", "refsource": "CONFIRM", "url": "https://github.com/google/asylo/commit/ed0926bff0e423cd122a18b3d2fc772817f66825" } ] }, "solution": [ { "lang": "en" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2020-8935", "datePublished": "2020-12-15T14:55:32", "dateReserved": "2020-02-12T00:00:00", "dateUpdated": "2024-08-04T10:12:11.011Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8944 (GCVE-0-2020-8944)
Vulnerability from cvelistv5
Published
2020-12-15 14:55
Modified
2024-08-04 10:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Overflow
Summary
An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of a pointer. An attacker can use this pointer to write to arbitrary memory addresses including those within the secure enclave We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Google LLC | Asylo |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:10.992Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/google/asylo/commit/382da2b8b09cbf928668a2445efb778f76bd9c8a" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Asylo", "vendor": "Google LLC", "versions": [ { "lessThanOrEqual": "0.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "en", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "en", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "en", "value": "Kang Li (Baidu Security)" } ], "descriptions": [ { "lang": "en", "value": "An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of a pointer. An attacker can use this pointer to write to arbitrary memory addresses including those within the secure enclave We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-15T14:55:39", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/google/asylo/commit/382da2b8b09cbf928668a2445efb778f76bd9c8a" } ], "solutions": [ { "lang": "en", "value": "We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unchecked buffer overrun in ecall_restore", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2020-8944", "STATE": "PUBLIC", "TITLE": "Unchecked buffer overrun in ecall_restore" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Asylo", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "0.6.0" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "credit": [ { "lang": "eng", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "eng", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "eng", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "eng", "value": "Kang Li (Baidu Security)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of a pointer. An attacker can use this pointer to write to arbitrary memory addresses including those within the secure enclave We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-120 Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/google/asylo/commit/382da2b8b09cbf928668a2445efb778f76bd9c8a", "refsource": "CONFIRM", "url": "https://github.com/google/asylo/commit/382da2b8b09cbf928668a2445efb778f76bd9c8a" } ] }, "solution": [ { "lang": "en", "value": "We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a" } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2020-8944", "datePublished": "2020-12-15T14:55:39", "dateReserved": "2020-02-12T00:00:00", "dateUpdated": "2024-08-04T10:12:10.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8939 (GCVE-0-2020-8939)
Vulnerability from cvelistv5
Published
2020-12-15 14:55
Modified
2024-08-04 10:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
An out of bounds read on the enc_untrusted_inet_ntop function allows an attack to extend the result size that is used by memcpy() to read memory from within the enclave heap. We recommend upgrading past commit 6ff3b77ffe110a33a2f93848a6333f33616f02c4
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Google LLC | Asylo |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:11.010Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/google/asylo/commit/6ff3b77ffe110a33a2f93848a6333f33616f02c4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Asylo", "vendor": "Google LLC", "versions": [ { "lessThanOrEqual": "0.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "en", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "en", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "en", "value": "Kang Li (Baidu Security)" } ], "descriptions": [ { "lang": "en", "value": "An out of bounds read on the enc_untrusted_inet_ntop function allows an attack to extend the result size that is used by memcpy() to read memory from within the enclave heap. We recommend upgrading past commit 6ff3b77ffe110a33a2f93848a6333f33616f02c4" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-15T14:55:35", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/google/asylo/commit/6ff3b77ffe110a33a2f93848a6333f33616f02c4" } ], "solutions": [ { "lang": "en", "value": "We recommend upgrading past commit 6ff3b77ffe110a33a2f93848a6333f33616f02c4" } ], "source": { "discovery": "EXTERNAL" }, "title": "Out of Bounds read in Asylo", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2020-8939", "STATE": "PUBLIC", "TITLE": "Out of Bounds read in Asylo" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Asylo", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "0.6.0" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "credit": [ { "lang": "eng", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "eng", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "eng", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "eng", "value": "Kang Li (Baidu Security)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An out of bounds read on the enc_untrusted_inet_ntop function allows an attack to extend the result size that is used by memcpy() to read memory from within the enclave heap. We recommend upgrading past commit 6ff3b77ffe110a33a2f93848a6333f33616f02c4" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125 Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/google/asylo/commit/6ff3b77ffe110a33a2f93848a6333f33616f02c4", "refsource": "CONFIRM", "url": "https://github.com/google/asylo/commit/6ff3b77ffe110a33a2f93848a6333f33616f02c4" } ] }, "solution": [ { "lang": "en", "value": "We recommend upgrading past commit 6ff3b77ffe110a33a2f93848a6333f33616f02c4" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2020-8939", "datePublished": "2020-12-15T14:55:35", "dateReserved": "2020-02-12T00:00:00", "dateUpdated": "2024-08-04T10:12:11.010Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-22552 (GCVE-0-2021-22552)
Vulnerability from cvelistv5
Published
2021-08-02 15:40
Modified
2024-09-17 01:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-126 - Buffer Over-read
Summary
An untrusted memory read vulnerability in Asylo versions up to 0.6.1 allows an untrusted attacker to pass a syscall number in MessageReader that is then used by sysno() and can bypass validation. This can allow the attacker to read memory from within the secure enclave. We recommend updating to Asylo 0.6.3 or past https://github.com/google/asylo/commit/90d7619e9dd99bcdb6cd28c7649d741d254d9a1a
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Google LLC | Asylo |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.032Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/google/asylo/commit/90d7619e9dd99bcdb6cd28c7649d741d254d9a1a" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Asylo", "vendor": "Google LLC", "versions": [ { "lessThanOrEqual": "0.6.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "en", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "en", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "en", "value": "Kang Li (Baidu Security)" } ], "datePublic": "2021-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "An untrusted memory read vulnerability in Asylo versions up to 0.6.1 allows an untrusted attacker to pass a syscall number in MessageReader that is then used by sysno() and can bypass validation. This can allow the attacker to read memory from within the secure enclave. We recommend updating to Asylo 0.6.3 or past https://github.com/google/asylo/commit/90d7619e9dd99bcdb6cd28c7649d741d254d9a1a" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-126", "description": "CWE-126 Buffer Over-read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T15:40:10", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/google/asylo/commit/90d7619e9dd99bcdb6cd28c7649d741d254d9a1a" } ], "source": { "discovery": "EXTERNAL" }, "title": "Memory overread secure enclave in Asylo 0.6.2", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "DATE_PUBLIC": "2021-06-03T10:00:00.000Z", "ID": "CVE-2021-22552", "STATE": "PUBLIC", "TITLE": "Memory overread secure enclave in Asylo 0.6.2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Asylo", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "0.6.2" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "credit": [ { "lang": "eng", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "eng", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "eng", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "eng", "value": "Kang Li (Baidu Security)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An untrusted memory read vulnerability in Asylo versions up to 0.6.1 allows an untrusted attacker to pass a syscall number in MessageReader that is then used by sysno() and can bypass validation. This can allow the attacker to read memory from within the secure enclave. We recommend updating to Asylo 0.6.3 or past https://github.com/google/asylo/commit/90d7619e9dd99bcdb6cd28c7649d741d254d9a1a" } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-126 Buffer Over-read" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/google/asylo/commit/90d7619e9dd99bcdb6cd28c7649d741d254d9a1a", "refsource": "MISC", "url": "https://github.com/google/asylo/commit/90d7619e9dd99bcdb6cd28c7649d741d254d9a1a" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2021-22552", "datePublished": "2021-08-02T15:40:10.426091Z", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-09-17T01:40:58.668Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-22548 (GCVE-0-2021-22548)
Vulnerability from cvelistv5
Published
2021-06-08 13:15
Modified
2024-09-17 01:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-788 - Access of Memory Location After End of Buffer
Summary
An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Google LLC | Asylo |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.780Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Asylo", "vendor": "Google LLC", "versions": [ { "lessThanOrEqual": "0.6.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "en", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "en", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "en", "value": "Kang Li (Baidu Security)" } ], "datePublic": "2021-03-29T00:00:00", "descriptions": [ { "lang": "en", "value": "An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-788", "description": "CWE-788 Access of Memory Location After End of Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-08T13:15:13", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c" } ], "source": { "discovery": "EXTERNAL" }, "title": "Arbitrary enclave memory overread vulnerability in Asylo TrustedPrimitives::UntrustedCall", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "DATE_PUBLIC": "2021-03-29T10:00:00.000Z", "ID": "CVE-2021-22548", "STATE": "PUBLIC", "TITLE": "Arbitrary enclave memory overread vulnerability in Asylo TrustedPrimitives::UntrustedCall" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Asylo", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "0.6.2" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "credit": [ { "lang": "eng", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "eng", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "eng", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "eng", "value": "Kang Li (Baidu Security)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-788 Access of Memory Location After End of Buffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c", "refsource": "MISC", "url": "https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2021-22548", "datePublished": "2021-06-08T13:15:13.466433Z", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-09-17T01:11:52.435Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8937 (GCVE-0-2020-8937)
Vulnerability from cvelistv5
Published
2020-12-15 14:55
Modified
2024-08-04 10:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Overflow
Summary
An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to enc_untrusted_create_wait_queue that uses a pointer queue that relies on UntrustedLocalMemcpy, which fails to validate where the pointer is located. This allows an attacker to write memory values from within the enclave. We recommend upgrading past commit a37fb6a0e7daf30134dbbf357c9a518a1026aa02
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Google LLC | Asylo |
Version: 0.6.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:11.093Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/google/asylo/commit/a37fb6a0e7daf30134dbbf357c9a518a1026aa02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Asylo", "vendor": "Google LLC", "versions": [ { "lessThanOrEqual": "0.6.0", "status": "affected", "version": "0.6.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "en", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "en", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "en", "value": "Kang Li (Baidu Security)" } ], "descriptions": [ { "lang": "en", "value": "An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to enc_untrusted_create_wait_queue that uses a pointer queue that relies on UntrustedLocalMemcpy, which fails to validate where the pointer is located. This allows an attacker to write memory values from within the enclave. We recommend upgrading past commit a37fb6a0e7daf30134dbbf357c9a518a1026aa02" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-15T14:55:33", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/google/asylo/commit/a37fb6a0e7daf30134dbbf357c9a518a1026aa02" } ], "solutions": [ { "lang": "en", "value": "Upgrade past commit a37fb6a0e7daf30134dbbf357c9a518a1026aa02" } ], "source": { "discovery": "EXTERNAL" }, "title": "Arbitrary enclave memory location write from untrusted environment", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2020-8937", "STATE": "PUBLIC", "TITLE": "Arbitrary enclave memory location write from untrusted environment" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Asylo", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "0.6.0", "version_value": "0.6.0" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "credit": [ { "lang": "eng", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "eng", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "eng", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "eng", "value": "Kang Li (Baidu Security)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to enc_untrusted_create_wait_queue that uses a pointer queue that relies on UntrustedLocalMemcpy, which fails to validate where the pointer is located. This allows an attacker to write memory values from within the enclave. We recommend upgrading past commit a37fb6a0e7daf30134dbbf357c9a518a1026aa02" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-120 Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/google/asylo/commit/a37fb6a0e7daf30134dbbf357c9a518a1026aa02", "refsource": "CONFIRM", "url": "https://github.com/google/asylo/commit/a37fb6a0e7daf30134dbbf357c9a518a1026aa02" } ] }, "solution": [ { "lang": "en", "value": "Upgrade past commit a37fb6a0e7daf30134dbbf357c9a518a1026aa02" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2020-8937", "datePublished": "2020-12-15T14:55:34", "dateReserved": "2020-02-12T00:00:00", "dateUpdated": "2024-08-04T10:12:11.093Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8938 (GCVE-0-2020-8938)
Vulnerability from cvelistv5
Published
2020-12-15 14:55
Modified
2024-08-04 10:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Arbitrary enclave memory write from untrusted environment
Summary
An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to FromkLinuxSockAddr with attacker controlled content and size of klinux_addr which allows an attacker to write memory values from within the enclave. We recommend upgrading past commit a37fb6a0e7daf30134dbbf357c9a518a1026aa02
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Google LLC | Asylo |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:11.012Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/google/asylo/commit/bda9772e7872b0d2b9bee32930cf7a4983837b39" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Asylo", "vendor": "Google LLC", "versions": [ { "lessThanOrEqual": "0.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "en", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "en", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "en", "value": "Kang Li (Baidu Security)" } ], "descriptions": [ { "lang": "en", "value": "An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to FromkLinuxSockAddr with attacker controlled content and size of klinux_addr which allows an attacker to write memory values from within the enclave. We recommend upgrading past commit a37fb6a0e7daf30134dbbf357c9a518a1026aa02" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary enclave memory write from untrusted environment", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-15T14:55:34", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/google/asylo/commit/bda9772e7872b0d2b9bee32930cf7a4983837b39" } ], "solutions": [ { "lang": "en", "value": "Upgrade past commit a37fb6a0e7daf30134dbbf357c9a518a1026aa02" } ], "source": { "discovery": "EXTERNAL" }, "title": "Arbitrary enclave memory location write from untrusted environment", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2020-8938", "STATE": "PUBLIC", "TITLE": "Arbitrary enclave memory location write from untrusted environment" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Asylo", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "0.6.0" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "credit": [ { "lang": "eng", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "eng", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "eng", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "eng", "value": "Kang Li (Baidu Security)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to FromkLinuxSockAddr with attacker controlled content and size of klinux_addr which allows an attacker to write memory values from within the enclave. We recommend upgrading past commit a37fb6a0e7daf30134dbbf357c9a518a1026aa02" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Arbitrary enclave memory write from untrusted environment" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/google/asylo/commit/bda9772e7872b0d2b9bee32930cf7a4983837b39", "refsource": "CONFIRM", "url": "https://github.com/google/asylo/commit/bda9772e7872b0d2b9bee32930cf7a4983837b39" } ] }, "solution": [ { "lang": "en", "value": "Upgrade past commit a37fb6a0e7daf30134dbbf357c9a518a1026aa02" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2020-8938", "datePublished": "2020-12-15T14:55:35", "dateReserved": "2020-02-12T00:00:00", "dateUpdated": "2024-08-04T10:12:11.012Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8943 (GCVE-0-2020-8943)
Vulnerability from cvelistv5
Published
2020-12-15 14:55
Modified
2024-08-04 10:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Overflow
Summary
An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_recvfrom whose return size was not validated against the requested size. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading past commit 6e158d558abd3c29a0208e30c97c9a8c5bd4230f
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Google LLC | Asylo |
Version: unspecified < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:11.017Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/google/asylo/commit/6e158d558abd3c29a0208e30c97c9a8c5bd4230f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Asylo", "vendor": "Google LLC", "versions": [ { "lessThanOrEqual": "0.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "en", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "en", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "en", "value": "Kang Li (Baidu Security)" } ], "descriptions": [ { "lang": "en", "value": "An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_recvfrom whose return size was not validated against the requested size. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading past commit 6e158d558abd3c29a0208e30c97c9a8c5bd4230f" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-15T14:55:38", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/google/asylo/commit/6e158d558abd3c29a0208e30c97c9a8c5bd4230f" } ], "solutions": [ { "lang": "en", "value": "We recommend upgradingpast commit 6e158d558abd3c29a0208e30c97c9a8c5bd4230f" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unchecked buffer overrun in enc_untrusted_recvfrom", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2020-8943", "STATE": "PUBLIC", "TITLE": "Unchecked buffer overrun in enc_untrusted_recvfrom" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Asylo", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "0.6.0" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "credit": [ { "lang": "eng", "value": "Qinkun Bao (Baidu Security)" }, { "lang": "eng", "value": "Zhaofeng Chen (Baidu Security)" }, { "lang": "eng", "value": "Mingshen Sun (Baidu Security)" }, { "lang": "eng", "value": "Kang Li (Baidu Security)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_recvfrom whose return size was not validated against the requested size. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading past commit 6e158d558abd3c29a0208e30c97c9a8c5bd4230f" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-120 Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/google/asylo/commit/6e158d558abd3c29a0208e30c97c9a8c5bd4230f", "refsource": "CONFIRM", "url": "https://github.com/google/asylo/commit/6e158d558abd3c29a0208e30c97c9a8c5bd4230f" } ] }, "solution": [ { "lang": "en", "value": "We recommend upgradingpast commit 6e158d558abd3c29a0208e30c97c9a8c5bd4230f" } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2020-8943", "datePublished": "2020-12-15T14:55:38", "dateReserved": "2020-02-12T00:00:00", "dateUpdated": "2024-08-04T10:12:11.017Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8904 (GCVE-0-2020-8904)
Vulnerability from cvelistv5
Published
2020-08-12 18:20
Modified
2024-09-16 23:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-823 - Use of Out-of-range Pointer Offset
Summary
An arbitrary memory overwrite vulnerability in the trusted memory of Asylo exists in versions prior to 0.6.0. As the ecall_restore function fails to validate the range of the output_len pointer, an attacker can manipulate the tmp_output_len value and write to an arbitrary location in the trusted (enclave) memory. We recommend updating Asylo to version 0.6.0 or later.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Google LLC | Asylo |
Version: stable < 0.6.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:11.014Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/google/asylo/commit/e582f36ac49ee11a21d23ad6a30c333092e0a94e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Asylo", "vendor": "Google LLC", "versions": [ { "lessThan": "0.6.0", "status": "affected", "version": "stable", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Qinkun Bao, Zhaofeng Chen, Mingshen Sun, and Kang Li from Baidu Security" } ], "datePublic": "2020-07-22T00:00:00", "descriptions": [ { "lang": "en", "value": "An arbitrary memory overwrite vulnerability in the trusted memory of Asylo exists in versions prior to 0.6.0. As the ecall_restore function fails to validate the range of the output_len pointer, an attacker can manipulate the tmp_output_len value and write to an arbitrary location in the trusted (enclave) memory. We recommend updating Asylo to version 0.6.0 or later." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-823", "description": "CWE-823 Use of Out-of-range Pointer Offset", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-12T18:20:12", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/google/asylo/commit/e582f36ac49ee11a21d23ad6a30c333092e0a94e" } ], "source": { "discovery": "EXTERNAL" }, "title": "Arbitrary trusted memory overwrite vulnerability in Asylo", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "DATE_PUBLIC": "2020-07-22T00:22:00.000Z", "ID": "CVE-2020-8904", "STATE": "PUBLIC", "TITLE": "Arbitrary trusted memory overwrite vulnerability in Asylo" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Asylo", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "stable", "version_value": "0.6.0" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "credit": [ { "lang": "eng", "value": "Qinkun Bao, Zhaofeng Chen, Mingshen Sun, and Kang Li from Baidu Security" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An arbitrary memory overwrite vulnerability in the trusted memory of Asylo exists in versions prior to 0.6.0. As the ecall_restore function fails to validate the range of the output_len pointer, an attacker can manipulate the tmp_output_len value and write to an arbitrary location in the trusted (enclave) memory. We recommend updating Asylo to version 0.6.0 or later." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-823 Use of Out-of-range Pointer Offset" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/google/asylo/commit/e582f36ac49ee11a21d23ad6a30c333092e0a94e", "refsource": "CONFIRM", "url": "https://github.com/google/asylo/commit/e582f36ac49ee11a21d23ad6a30c333092e0a94e" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2020-8904", "datePublished": "2020-08-12T18:20:13.047510Z", "dateReserved": "2020-02-12T00:00:00", "dateUpdated": "2024-09-16T23:21:07.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8905 (GCVE-0-2020-8905)
Vulnerability from cvelistv5
Published
2020-08-12 18:20
Modified
2024-09-17 00:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Overflow
Summary
A buffer length validation vulnerability in Asylo versions prior to 0.6.0 allows an attacker to read data they should not have access to. The 'enc_untrusted_recvfrom' function generates a return value which is deserialized by 'MessageReader', and copied into three different 'extents'. The length of the third 'extents' is controlled by the outside world, and not verified on copy, allowing the attacker to force Asylo to copy trusted memory data into an untrusted buffer of significantly small length.. We recommend updating Asylo to version 0.6.0 or later.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Google LLC | Asylo |
Version: stable < 0.6.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:11.061Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/google/asylo/commit/299f804acbb95a612ab7c504d25ab908aa59ae93" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Asylo", "vendor": "Google LLC", "versions": [ { "lessThan": "0.6.0", "status": "affected", "version": "stable", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Qinkun Bao, Zhaofeng Chen, Mingshen Sun, and Kang Li from Baidu Security" } ], "datePublic": "2020-07-22T00:00:00", "descriptions": [ { "lang": "en", "value": "A buffer length validation vulnerability in Asylo versions prior to 0.6.0 allows an attacker to read data they should not have access to. The \u0027enc_untrusted_recvfrom\u0027 function generates a return value which is deserialized by \u0027MessageReader\u0027, and copied into three different \u0027extents\u0027. The length of the third \u0027extents\u0027 is controlled by the outside world, and not verified on copy, allowing the attacker to force Asylo to copy trusted memory data into an untrusted buffer of significantly small length.. We recommend updating Asylo to version 0.6.0 or later." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-12T18:20:13", "orgId": "14ed7db2-1595-443d-9d34-6215bf890778", "shortName": "Google" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/google/asylo/commit/299f804acbb95a612ab7c504d25ab908aa59ae93" } ], "source": { "discovery": "EXTERNAL" }, "title": "Confidential Information Disclosure vulnerability in Asylo", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "DATE_PUBLIC": "2020-07-22T00:22:00.000Z", "ID": "CVE-2020-8905", "STATE": "PUBLIC", "TITLE": "Confidential Information Disclosure vulnerability in Asylo" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Asylo", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "stable", "version_value": "0.6.0" } ] } } ] }, "vendor_name": "Google LLC" } ] } }, "credit": [ { "lang": "eng", "value": "Qinkun Bao, Zhaofeng Chen, Mingshen Sun, and Kang Li from Baidu Security" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A buffer length validation vulnerability in Asylo versions prior to 0.6.0 allows an attacker to read data they should not have access to. The \u0027enc_untrusted_recvfrom\u0027 function generates a return value which is deserialized by \u0027MessageReader\u0027, and copied into three different \u0027extents\u0027. The length of the third \u0027extents\u0027 is controlled by the outside world, and not verified on copy, allowing the attacker to force Asylo to copy trusted memory data into an untrusted buffer of significantly small length.. We recommend updating Asylo to version 0.6.0 or later." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-120 Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/google/asylo/commit/299f804acbb95a612ab7c504d25ab908aa59ae93", "refsource": "CONFIRM", "url": "https://github.com/google/asylo/commit/299f804acbb95a612ab7c504d25ab908aa59ae93" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778", "assignerShortName": "Google", "cveId": "CVE-2020-8905", "datePublished": "2020-08-12T18:20:13.466578Z", "dateReserved": "2020-02-12T00:00:00", "dateUpdated": "2024-09-17T00:06:27.121Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }