First published: Wed Jul 22 2020(Updated: )
An arbitrary memory overwrite vulnerability in the trusted memory of Asylo exists in versions prior to 0.6.0. As the ecall_restore function fails to validate the range of the output_len pointer, an attacker can manipulate the tmp_output_len value and write to an arbitrary location in the trusted (enclave) memory. We recommend updating Asylo to version 0.6.0 or later.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Products | <0.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8904 has a high severity rating due to the potential for arbitrary memory overwrite by an attacker.
To fix CVE-2020-8904, upgrade Google Asylo to version 0.6.0 or later.
CVE-2020-8904 affects all versions of Google Asylo prior to 0.6.0.
CVE-2020-8904 is classified as an arbitrary memory overwrite vulnerability.
By exploiting CVE-2020-8904, an attacker could potentially manipulate memory to execute code or crash the application.