Vulnerability Name: | CVE-2022-23645 (CCN-219961) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2022-02-18 | ||||||||||||||||||||||||||||||||||||
Published: | 2022-02-18 | ||||||||||||||||||||||||||||||||||||
Updated: | 2022-03-07 | ||||||||||||||||||||||||||||||||||||
Summary: | swtpm is a libtpms-based TPM emulator with socket, character device, and Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are vulnerable to out-of-bounds read. A specially crafted header of swtpm's state, where the blobheader's hdrsize indicator has an invalid value, may cause an out-of-bounds access when the byte array representing the state of the TPM is accessed. This will likely crash swtpm or prevent it from starting since the state cannot be understood. Users should upgrade to swtpm v0.5.3, v0.6.2, or v0.7.1 to receive a patch. There are currently no known workarounds. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
4.8 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-125 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-23645 Source: XF Type: UNKNOWN swtpm-cve202223645-dos(219961) Source: MISC Type: Patch, Third Party Advisory https://github.com/stefanberger/swtpm/commit/9f740868fc36761de27df3935513bdebf8852d19 Source: MISC Type: Release Notes, Third Party Advisory https://github.com/stefanberger/swtpm/releases/tag/v0.5.3 Source: MISC Type: Release Notes, Third Party Advisory https://github.com/stefanberger/swtpm/releases/tag/v0.6.2 Source: MISC Type: Release Notes, Third Party Advisory https://github.com/stefanberger/swtpm/releases/tag/v0.7.1 Source: CCN Type: SWTPM GIT Repository Out-of-bounds read in swtpm when a specially crafted header of swtpm's state is given Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/stefanberger/swtpm/security/advisories/GHSA-2qgm-8xf4-3hqw Source: FEDORA Type: Third Party Advisory FEDORA-2022-12443a525c | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |