An arbitrary memory overwrite vulnerability in the trusted memory of Asylo exists in versions prior to 0.6.0. As the ecall_restore function fails to validate the range of the output_len pointer, an attacker can manipulate the tmp_output_len value and write to an arbitrary location in the trusted (enclave) memory. We recommend updating Asylo to version 0.6.0 or later.
References
Link | Resource |
---|---|
https://github.com/google/asylo/commit/e582f36ac49ee11a21d23ad6a30c333092e0a94e | Patch Third Party Advisory |
Configurations
Information
Published : 2020-08-12 12:15
Updated : 2020-08-13 07:42
NVD link : CVE-2020-8904
Mitre link : CVE-2020-8904
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
- asylo