Description
An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to UntrustedCall. UntrustedCall failed to validate the buffer range within sgx_params and allowed the host to return a pointer that was an address within the enclave memory. This allowed an attacker to read memory values from within the enclave.
No analysis available yet.
Remediation
Vendor Solution
Upgrade past commit 83036fd841d33baa7e039f842d131aa7881fdcc2
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-29767 | An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to UntrustedCall. UntrustedCall failed to validate the buffer range within sgx_params and allowed the host to return a pointer that was an address within the enclave memory. This allowed an attacker to read memory values from within the enclave. |
References
History
No history.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-08-04T10:12:11.009Z
Reserved: 2020-02-12T00:00:00.000Z
Link: CVE-2020-8936
No data.
Status : Modified
Published: 2020-12-15T15:15:13.127
Modified: 2024-11-21T05:39:41.990
Link: CVE-2020-8936
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD