147 lines
4.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2020-8941",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2020-12-15T15:15:13.503",
"lastModified": "2024-11-21T05:39:42.520",
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_inet_pton using an attacker controlled klinux_addr_buffer parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading past commit 8fed5e334131abaf9c5e17307642fbf6ce4a57ec"
},
{
"lang": "es",
"value": "Una vulnerabilidad de lectura de memoria arbitraria en Asylo versiones hasta 0.6.0, permite a un atacante que no es confiable realizar una llamada a la funci\u00f3n enc_untrusted_inet_pton usando un par\u00e1metro klinux_addr_buffer controlado por el atacante. El tama\u00f1o del par\u00e1metro no es comprobado, permitiendo al atacante leer ubicaciones de memoria fuera del tama\u00f1o de b\u00fafer previsto, incluyendo unas direcciones de memoria dentro del enclave seguro. Recomendamos actualizar m\u00e1s all\u00e1 del commit 8fed5e334131abaf9c5e17307642fbf6ce4a57ec"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@google.com",
"type": "Secondary",
2023-04-24 12:24:31 +02:00
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
2023-04-24 12:24:31 +02:00
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
2023-04-24 12:24:31 +02:00
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"exploitabilityScore": 1.0,
"impactScore": 4.2
2023-04-24 12:24:31 +02:00
},
{
"source": "nvd@nist.gov",
"type": "Primary",
2023-04-24 12:24:31 +02:00
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
2023-04-24 12:24:31 +02:00
"attackVector": "LOCAL",
"attackComplexity": "LOW",
2023-04-24 12:24:31 +02:00
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
2023-04-24 12:24:31 +02:00
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 2.1,
2023-04-24 12:24:31 +02:00
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cve-coordination@google.com",
"type": "Secondary",
2023-04-24 12:24:31 +02:00
"description": [
{
"lang": "en",
"value": "CWE-120"
2023-04-24 12:24:31 +02:00
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
2023-04-24 12:24:31 +02:00
"description": [
{
"lang": "en",
"value": "CWE-125"
2023-04-24 12:24:31 +02:00
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:asylo:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.6.0",
"matchCriteriaId": "D4356338-A28E-442E-BD14-1A927E3824E9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/google/asylo/commit/8fed5e334131abaf9c5e17307642fbf6ce4a57ec",
"source": "cve-coordination@google.com",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://github.com/google/asylo/commit/8fed5e334131abaf9c5e17307642fbf6ce4a57ec",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
]
2023-04-24 12:24:31 +02:00
}
]
}