CVE-2020-8942
Summary
| CVE | CVE-2020-8942 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-12-15 15:15:00 UTC |
| Updated | 2020-12-17 18:44:00 UTC |
| Description | An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_read whose return size was not validated against the requrested size. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading past commit b1d120a2c7d7446d2cc58d517e20a1b184b82200 |
Risk And Classification
Problem Types: CWE-125
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Check for return size in enc_untrusted_read · google/asylo@b1d120a · GitHub | CONFIRM | github.com | Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Qinkun Bao (Baidu Security)
LEGACY: Zhaofeng Chen (Baidu Security)
LEGACY: Mingshen Sun (Baidu Security)
LEGACY: Kang Li (Baidu Security)
There are currently no legacy QID mappings associated with this CVE.