Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Freely Allocate Buffer on The Stack With Data From Socket
Vulnerability Description
As noted in the “VTPM.md” file in the eve documentation, “VTPM is a server listening on port 8877 in EVE, exposing limited functionality of the TPM to the clients. VTPM allows clients to execute tpm2-tools binaries from a list of hardcoded options” The communication with this server is done using protobuf, and the data is comprised of 2 parts: 1. Header 2. Data When a connection is made, the server is waiting for 4 bytes of data, which will be the header, and these 4 bytes would be parsed as uint32 size of the actual data to come. Then, in the function “handleRequest” this size is then used in order to allocate a payload on the stack for the incoming data. As this payload is allocated on the stack, this will allow overflowing the stack size allocated for the relevant process with freely controlled data. * An attacker can crash the system. * An attacker can gain control over the system, specifically on the “vtpm_server” process which has very high privileges.
CVSS Information
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Vulnerability Type
未经控制的内存分配
Vulnerability Title
EVE OS 安全漏洞
Vulnerability Description
EVE OS是IF Edge开源的一个用于分布式边缘计算的通用、开放的基于 Linux 的操作系统。 EVE OS存在安全漏洞,该漏洞源于允许攻击者使用来自套接字的数据在堆栈上自由分配缓冲区,从而导致系统崩溃。
CVSS Information
N/A
Vulnerability Type
N/A