An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of a pointer. An attacker can use this pointer to write to arbitrary memory addresses including those within the secure enclave We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a
References
Link | Resource |
---|---|
https://github.com/google/asylo/commit/382da2b8b09cbf928668a2445efb778f76bd9c8a | Exploit Third Party Advisory |
https://github.com/google/asylo/commit/382da2b8b09cbf928668a2445efb778f76bd9c8a | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/google/asylo/commit/382da2b8b09cbf928668a2445efb778f76bd9c8a - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.3 |
Information
Published : 2020-12-15 15:15
Updated : 2024-11-21 05:39
NVD link : CVE-2020-8944
Mitre link : CVE-2020-8944
CVE.ORG link : CVE-2020-8944
JSON object : View
Products Affected
- asylo