A buffer overflow in the component /Enclave.cpp of Electronics and Telecommunications Research Institute ShieldStore commit 58d455617f99705f0ffd8a27616abdf77bdc1bdc allows attackers to cause an information leak via a crafted structure from an untrusted operating system.
References
Link | Resource |
---|---|
http://electronics.com | Broken Link |
http://shieldstore.com | Broken Link |
https://github.com/cocoppang/ShieldStore/blob/master/Enclave/Enclave.cpp | Patch |
https://github.com/cocoppang/ShieldStore/issues/19 | Exploit Issue Tracking |
http://electronics.com | Broken Link |
http://shieldstore.com | Broken Link |
https://github.com/cocoppang/ShieldStore/blob/master/Enclave/Enclave.cpp | Patch |
https://github.com/cocoppang/ShieldStore/issues/19 | Exploit Issue Tracking |
Configurations
History
21 Nov 2024, 06:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://electronics.com - Broken Link | |
References | () http://shieldstore.com - Broken Link | |
References | () https://github.com/cocoppang/ShieldStore/blob/master/Enclave/Enclave.cpp - Patch | |
References | () https://github.com/cocoppang/ShieldStore/issues/19 - Exploit, Issue Tracking |
Information
Published : 2023-05-09 03:15
Updated : 2024-11-21 06:30
NVD link : CVE-2021-44283
Mitre link : CVE-2021-44283
CVE.ORG link : CVE-2021-44283
JSON object : View
Products Affected
shieldstore_project
- shieldstore
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')