Description
An arbitrary memory overwrite vulnerability in the trusted memory of Asylo exists in versions prior to 0.6.0. As the ecall_restore function fails to validate the range of the output_len pointer, an attacker can manipulate the tmp_output_len value and write to an arbitrary location in the trusted (enclave) memory. We recommend updating Asylo to version 0.6.0 or later.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-29743 | An arbitrary memory overwrite vulnerability in the trusted memory of Asylo exists in versions prior to 0.6.0. As the ecall_restore function fails to validate the range of the output_len pointer, an attacker can manipulate the tmp_output_len value and write to an arbitrary location in the trusted (enclave) memory. We recommend updating Asylo to version 0.6.0 or later. |
References
History
No history.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-09-16T23:21:07.649Z
Reserved: 2020-02-12T00:00:00.000Z
Link: CVE-2020-8904
No data.
Status : Modified
Published: 2020-08-12T19:15:14.593
Modified: 2024-11-21T05:39:39.700
Link: CVE-2020-8904
No data.
OpenCVE Enrichment
No data.
EUVD