脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
Freely Allocate Buffer on The Stack With Data From Socket
脆弱性説明
As noted in the “VTPM.md” file in the eve documentation, “VTPM is a server listening on port 8877 in EVE, exposing limited functionality of the TPM to the clients. VTPM allows clients to execute tpm2-tools binaries from a list of hardcoded options” The communication with this server is done using protobuf, and the data is comprised of 2 parts: 1. Header 2. Data When a connection is made, the server is waiting for 4 bytes of data, which will be the header, and these 4 bytes would be parsed as uint32 size of the actual data to come. Then, in the function “handleRequest” this size is then used in order to allocate a payload on the stack for the incoming data. As this payload is allocated on the stack, this will allow overflowing the stack size allocated for the relevant process with freely controlled data. * An attacker can crash the system. * An attacker can gain control over the system, specifically on the “vtpm_server” process which has very high privileges.
CVSS情報
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
脆弱性タイプ
未经控制的内存分配
脆弱性タイトル
EVE OS 安全漏洞
脆弱性説明
EVE OS是IF Edge开源的一个用于分布式边缘计算的通用、开放的基于 Linux 的操作系统。 EVE OS存在安全漏洞,该漏洞源于允许攻击者使用来自套接字的数据在堆栈上自由分配缓冲区,从而导致系统崩溃。
CVSS情報
N/A
脆弱性タイプ
N/A