Google

Asylo

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Veröffentlicht 02.08.2021 16:15:07
  • Zuletzt bearbeitet 21.11.2024 05:50:19

An untrusted memory read vulnerability in Asylo versions up to 0.6.1 allows an untrusted attacker to pass a syscall number in MessageReader that is then used by sysno() and can bypass validation. This can allow the attacker to read memory from within...

  • EPSS 0.02%
  • Veröffentlicht 08.06.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 05:50:18

An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is ...

  • EPSS 0.02%
  • Veröffentlicht 08.06.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 05:50:18

An attacker can modify the address to point to trusted memory to overwrite arbitrary trusted memory. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c

  • EPSS 0.02%
  • Veröffentlicht 08.06.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 05:50:18

An attacker can modify the pointers in enclave memory to overwrite arbitrary memory addresses within the secure enclave. It is recommended to update past 0.6.3 or git commit https://github.com/google/asylo/commit/a47ef55db2337d29de19c50cd29b0deb2871d...

  • EPSS 0.02%
  • Veröffentlicht 15.12.2020 15:15:13
  • Zuletzt bearbeitet 21.11.2024 05:39:41

An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to UntrustedCall. UntrustedCall failed to validate the buffer range within sgx_params and allowed the host to return a pointer that was a...

  • EPSS 0.02%
  • Veröffentlicht 15.12.2020 15:15:13
  • Zuletzt bearbeitet 21.11.2024 05:39:42

An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to enc_untrusted_create_wait_queue that uses a pointer queue that relies on UntrustedLocalMemcpy, which fails to validate where the point...

  • EPSS 0.04%
  • Veröffentlicht 15.12.2020 15:15:13
  • Zuletzt bearbeitet 21.11.2024 05:39:42

An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to FromkLinuxSockAddr with attacker controlled content and size of klinux_addr which allows an attacker to write memory values from withi...

  • EPSS 0.02%
  • Veröffentlicht 15.12.2020 15:15:13
  • Zuletzt bearbeitet 21.11.2024 05:39:42

An out of bounds read on the enc_untrusted_inet_ntop function allows an attack to extend the result size that is used by memcpy() to read memory from within the enclave heap. We recommend upgrading past commit 6ff3b77ffe110a33a2f93848a6333f33616f02c4

  • EPSS 0.02%
  • Veröffentlicht 15.12.2020 15:15:13
  • Zuletzt bearbeitet 21.11.2024 05:39:42

An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_recvmsg using an attacker controlled result parameter. The parameter size is unchecked allowing the attacker to read mem...

  • EPSS 0.02%
  • Veröffentlicht 15.12.2020 15:15:13
  • Zuletzt bearbeitet 21.11.2024 05:39:42

An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_inet_pton using an attacker controlled klinux_addr_buffer parameter. The parameter size is unchecked allowing the attack...