Keylime

Keylime

13 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 15.03.2025 08:50:48
  • Zuletzt bearbeitet 15.03.2025 09:15:10

A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions s...

  • EPSS 0.02%
  • Veröffentlicht 25.08.2023 17:15:08
  • Zuletzt bearbeitet 21.11.2024 08:13:04

A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. This issue may allow an attacker to impersonate an agent and hide the true status of a monitored machine if the fake age...

  • EPSS 0.21%
  • Veröffentlicht 24.07.2023 16:15:12
  • Zuletzt bearbeitet 21.11.2024 08:13:04

A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.

  • EPSS 0.02%
  • Veröffentlicht 19.07.2023 19:15:12
  • Zuletzt bearbeitet 21.11.2024 08:17:48

A flaw was found in the keylime attestation verifier, which fails to flag a device's submitted TPM quote as faulty when the quote's signature does not validate for some reason. Instead, it will only emit an error in the log without flagging the devic...

  • EPSS 0.03%
  • Veröffentlicht 22.11.2022 19:15:17
  • Zuletzt bearbeitet 29.04.2025 05:15:43

A vulnerability was found in keylime. This security issue happens in some circumstances, due to some improperly handled exceptions, there exists the possibility that a rogue agent could create errors on the verifier that stopped attestation attempts ...

Exploit
  • EPSS 0.4%
  • Veröffentlicht 21.09.2022 19:15:10
  • Zuletzt bearbeitet 27.05.2025 21:15:20

In Keylime before 6.3.0, unsanitized UUIDs can be passed by a rogue agent and can lead to log spoofing on the verifier and registrar.

Exploit
  • EPSS 0.39%
  • Veröffentlicht 21.09.2022 19:15:10
  • Zuletzt bearbeitet 27.05.2025 21:15:20

In Keylime before 6.3.0, Revocation Notifier uses a fixed /tmp path for UNIX domain socket which can allow unprivileged users a method to prohibit keylime operations.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 21.09.2022 19:15:10
  • Zuletzt bearbeitet 27.05.2025 21:15:20

In Keylime before 6.3.0, quote responses from the agent can contain possibly untrusted ZIP data which can lead to zip bombs.

Exploit
  • EPSS 0.37%
  • Veröffentlicht 21.09.2022 19:15:10
  • Zuletzt bearbeitet 22.05.2025 19:15:29

In Keylime before 6.3.0, current keylime installer installs the keylime.conf file, which can contain sensitive data, as world-readable.

Exploit
  • EPSS 2.76%
  • Veröffentlicht 21.09.2022 19:15:09
  • Zuletzt bearbeitet 27.05.2025 21:15:20

A vulnerability in Keylime before 6.3.0 allows an attacker to craft a request to the agent that resets the U and V keys as if the agent were being re-added to a verifier. This could lead to a remote code execution.