All the vulnerabilites related to tpm2-software - tpm2-tss
cve-2024-29040
Vulnerability from cvelistv5
Published
2024-06-28 21:02
Modified
2024-08-02 01:03
Severity ?
EPSS score ?
Summary
Fapi Verify Quote: Does not detect if quote was not generated by TPM
References
▼ | URL | Tags |
---|---|---|
https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-837m-jw3m-h9p6 | x_refsource_CONFIRM | |
https://github.com/tpm2-software/tpm2-tss/releases/tag/4.1.0 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
tpm2-software | tpm2-tss |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:tpm2_software:tpm2_tools:*:*:*:*:*:*:*:*", "cpe:2.3:a:tpm2_software_stack_project:tpm2_software_stack:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "tpm2_software_stack", "vendor": "tpm2_software_stack_project", "versions": [ { "lessThan": "4.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-29040", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-02T18:42:06.230859Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-02T18:49:43.456Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:03:51.704Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-837m-jw3m-h9p6", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-837m-jw3m-h9p6" }, { "name": "https://github.com/tpm2-software/tpm2-tss/releases/tag/4.1.0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/tpm2-software/tpm2-tss/releases/tag/4.1.0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "tpm2-tss", "vendor": "tpm2-software", "versions": [ { "status": "affected", "version": "\u003c 4.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "This repository hosts source code implementing the Trusted Computing Group\u0027s (TCG) TPM2 Software Stack (TSS). The JSON Quote Info returned by Fapi_Quote has to be deserialized by Fapi_VerifyQuote to the TPM Structure `TPMS_ATTEST`. For the field `TPM2_GENERATED magic` of this structure any number can be used in the JSON structure. The verifier can receive a state which does not represent the actual, possibly malicious state of the device under test. The malicious device might get access to data it shouldn\u0027t, or can use services it shouldn\u0027t be able to. This \nissue has been patched in version 4.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502: Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-28T21:02:04.076Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-837m-jw3m-h9p6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-837m-jw3m-h9p6" }, { "name": "https://github.com/tpm2-software/tpm2-tss/releases/tag/4.1.0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/tpm2-software/tpm2-tss/releases/tag/4.1.0" } ], "source": { "advisory": "GHSA-837m-jw3m-h9p6", "discovery": "UNKNOWN" }, "title": "Fapi Verify Quote: Does not detect if quote was not generated by TPM" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-29040", "datePublished": "2024-06-28T21:02:04.076Z", "dateReserved": "2024-03-14T16:59:47.614Z", "dateUpdated": "2024-08-02T01:03:51.704Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22745
Vulnerability from cvelistv5
Published
2023-01-19 22:12
Modified
2024-08-02 10:20
Severity ?
EPSS score ?
Summary
Buffer Overlow in TSS2_RC_Decode in tpm2-tss
References
▼ | URL | Tags |
---|---|---|
https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-4j3v-fh23-vx67 | x_refsource_CONFIRM | |
https://github.com/tpm2-software/tpm2-tss/commit/306490c8d848c367faa2d9df81f5e69dab46ffb5 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
tpm2-software | tpm2-tss |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:30.190Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-4j3v-fh23-vx67", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-4j3v-fh23-vx67" }, { "name": "https://github.com/tpm2-software/tpm2-tss/commit/306490c8d848c367faa2d9df81f5e69dab46ffb5", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/tpm2-software/tpm2-tss/commit/306490c8d848c367faa2d9df81f5e69dab46ffb5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "tpm2-tss", "vendor": "tpm2-software", "versions": [ { "status": "affected", "version": "\u003c= 4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-19T22:12:40.208Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-4j3v-fh23-vx67", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-4j3v-fh23-vx67" }, { "name": "https://github.com/tpm2-software/tpm2-tss/commit/306490c8d848c367faa2d9df81f5e69dab46ffb5", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/tpm2-software/tpm2-tss/commit/306490c8d848c367faa2d9df81f5e69dab46ffb5" } ], "source": { "advisory": "GHSA-4j3v-fh23-vx67", "discovery": "UNKNOWN" }, "title": "Buffer Overlow in TSS2_RC_Decode in tpm2-tss" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22745", "datePublished": "2023-01-19T22:12:40.208Z", "dateReserved": "2023-01-06T14:21:05.893Z", "dateUpdated": "2024-08-02T10:20:30.190Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }