2 results (0.002 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

OP-TEE Trusted OS is the secure side implementation of OP-TEE project, a Trusted Execution Environment. Versions prior to 3.19.0, contain an Improper Validation of Array Index vulnerability. The function `cleanup_shm_refs()` is called by both `entry_invoke_command()` and `entry_open_session()`. The commands `OPTEE_MSG_CMD_OPEN_SESSION` and `OPTEE_MSG_CMD_INVOKE_COMMAND` can be executed from the normal world via an OP-TEE SMC. This function is not validating the `num_params` argument, which is only limited to `OPTEE_MSG_MAX_NUM_PARAMS` (127) in the function `get_cmd_buffer()`. • https://github.com/OP-TEE/optee_os/blob/c2d449482de098f1c894b94f338440e5a327813d/core/tee/entry_std.c#L257 https://github.com/OP-TEE/optee_os/commit/728616b28df659cf0bdde6e58a471f6ef25d023c https://github.com/OP-TEE/optee_os/security/advisories/GHSA-65w8-6mrg-52g7 https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:X/RC:X/CR:M/IR:M/AR:M/MAV:L/MAC:L/MPR:H/MUI:N/MS:C/MC:H/MI:H/MA:H&version=3.1 • CWE-129: Improper Validation of Array Index •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatures or public certificates by leveraging a Bleichenbacher signature forgery attack. La función rsa_verify_hash_ex en rsa_verify_hash.c en LibTomCrypt, como se utiliza en OP-TEE en versiones anteriores a 2.2.0, no valida que la longitud del mensaje es igual a la longitud de datos codificados en ASN.1, lo que facilita a atacantes remotos falsificar firmas RSA o certificados públicos aprovechando un ataque de falsificación de firma de Bleichenbacher. • https://bugzilla.redhat.com/show_bug.cgi?id=1370955 https://github.com/libtom/libtomcrypt/commit/5eb9743410ce4657e9d54fef26a2ee31a1b5dd0 https://www.op-tee.org/advisories • CWE-20: Improper Input Validation •