An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context.
References
Link | Resource |
---|---|
https://kb.cert.org/vuls/id/782720 | Third Party Advisory US Government Resource |
https://trustedcomputinggroup.org/about/security/ | Vendor Advisory |
https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: certcc
Published: 2023-02-28T18:02:27.064Z
Updated: 2023-02-28T19:09:18.722Z
Reserved: 2023-02-24T16:02:22.626Z
Link: CVE-2023-1017
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-02-28T19:15:16.657
Modified: 2024-04-01T15:50:16.683
Link: CVE-2023-1017
JSON object: View
Redhat Information
No data.
CWE