Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.
References
Link | Resource |
---|---|
https://sourceforge.net/p/tboot/code/ci/521c58e51eb5be105a29983742850e72c44ed80e/ | Issue Tracking Patch Third Party Advisory |
https://www.usenix.org/conference/usenixsecurity18/presentation/han | |
https://sourceforge.net/p/tboot/code/ci/521c58e51eb5be105a29983742850e72c44ed80e/ | Issue Tracking Patch Third Party Advisory |
https://www.usenix.org/conference/usenixsecurity18/presentation/han |
Configurations
History
21 Nov 2024, 03:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://sourceforge.net/p/tboot/code/ci/521c58e51eb5be105a29983742850e72c44ed80e/ - Issue Tracking, Patch, Third Party Advisory | |
References | () https://www.usenix.org/conference/usenixsecurity18/presentation/han - |
Information
Published : 2017-11-16 02:29
Updated : 2024-11-21 03:17
NVD link : CVE-2017-16837
Mitre link : CVE-2017-16837
CVE.ORG link : CVE-2017-16837
JSON object : View
Products Affected
trusted_boot_project
- trusted_boot
CWE
CWE-20
Improper Input Validation