CVE-2020-8944

An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of a pointer. An attacker can use this pointer to write to arbitrary memory addresses including those within the secure enclave We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:asylo:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
References () https://github.com/google/asylo/commit/382da2b8b09cbf928668a2445efb778f76bd9c8a - Exploit, Third Party Advisory () https://github.com/google/asylo/commit/382da2b8b09cbf928668a2445efb778f76bd9c8a - Exploit, Third Party Advisory
CVSS v2 : 2.1
v3 : 5.5
v2 : 2.1
v3 : 5.3

Information

Published : 2020-12-15 15:15

Updated : 2024-11-21 05:39


NVD link : CVE-2020-8944

Mitre link : CVE-2020-8944

CVE.ORG link : CVE-2020-8944


JSON object : View

Products Affected

google

  • asylo
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-787

Out-of-bounds Write