First published: Thu Nov 16 2017(Updated: )
Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trusted Boot Project | =1.9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16837 is classified with a high severity level due to the potential for arbitrary code execution.
To fix CVE-2017-16837, upgrade to a version of Trusted Boot beyond 1.9.6 that addresses the validation of function pointers.
CVE-2017-16837 affects users and systems using Trusted Boot version 1.9.6.
The impacts of CVE-2017-16837 can include local users gaining elevated privileges and the ability to overwrite dynamic PCRs of the TPM.
Yes, CVE-2017-16837 directly affects the security of the Trusted Platform Module through the manipulation of dynamic PCRs.