An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of a pointer. An attacker can use this pointer to write to arbitrary memory addresses including those within the secure enclave We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a
References
Link | Resource |
---|---|
https://github.com/google/asylo/commit/382da2b8b09cbf928668a2445efb778f76bd9c8a | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Google
Published: 2020-12-15T14:55:39
Updated: 2020-12-15T14:55:39
Reserved: 2020-02-12T00:00:00
Link: CVE-2020-8944
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-12-15T15:15:13.707
Modified: 2020-12-17T18:20:06.300
Link: CVE-2020-8944
JSON object: View
Redhat Information
No data.