Trusty contains a vulnerability in the NVIDIA OTE protocol that is present in all TAs. An incorrect message stream deserialization allows an attacker to use the malicious CA that is run by the user to cause the buffer overflow, which may lead to information disclosure and data modification.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21052 | Trusty contains a vulnerability in the NVIDIA OTE protocol that is present in all TAs. An incorrect message stream deserialization allows an attacker to use the malicious CA that is run by the user to cause the buffer overflow, which may lead to information disclosure and data modification. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://nvidia.custhelp.com/app/answers/detail/a_id/5205 |
|
History
No history.
Status: PUBLISHED
Assigner: nvidia
Published:
Updated: 2024-08-04T00:12:50.176Z
Reserved: 2021-06-09T00:00:00
Link: CVE-2021-34394
No data.
Status : Modified
Published: 2021-06-22T22:15:09.277
Modified: 2024-11-21T06:10:18.440
Link: CVE-2021-34394
No data.
OpenCVE Enrichment
No data.
EUVD