libspdm is a sample implementation that follows the DMTF SPDM specifications. Prior to versions 2.3.3 and 3.0, following a successful CAPABILITIES response, a libspdm Requester stores the Responder's CTExponent into its context without validation. If the Requester sends a request message that requires a cryptography operation by the Responder, such as CHALLENGE, libspdm will calculate the timeout value using the Responder's unvalidated CTExponent.
A patch is available in version 2.3.3. A workaround is also available. After completion of VCA, the Requester can check the value of the Responder's CTExponent. If it greater than or equal to 64, then the Requester can stop communication with the Responder.
References
Configurations
History
21 Nov 2024, 08:03
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.7 |
References | () https://github.com/DMTF/libspdm/issues/2068 - Patch | |
References | () https://github.com/DMTF/libspdm/pull/2069 - Patch | |
References | () https://github.com/DMTF/libspdm/security/advisories/GHSA-56h8-4gv5-jf2c - Vendor Advisory |
09 Jun 2023, 17:52
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:dmtf:libspdm:*:*:*:*:*:*:*:* | |
First Time |
Dmtf
Dmtf libspdm |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | (MISC) https://github.com/DMTF/libspdm/security/advisories/GHSA-56h8-4gv5-jf2c - Vendor Advisory | |
References | (MISC) https://github.com/DMTF/libspdm/pull/2069 - Patch | |
References | (MISC) https://github.com/DMTF/libspdm/issues/2068 - Patch |
01 Jun 2023, 17:29
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-01 17:15
Updated : 2024-11-21 08:03
NVD link : CVE-2023-32690
Mitre link : CVE-2023-32690
CVE.ORG link : CVE-2023-32690
JSON object : View
Products Affected
dmtf
- libspdm
CWE