Executive Summary

Informations
Name CVE-2023-49100 First vendor Publication 2024-02-21
Vendor Cve Last vendor Modification 2024-02-22

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Trusted Firmware-A (TF-A) before 2.10 has a potential read out-of-bounds in the SDEI service. The input parameter passed in register x1 is not validated well enough in the function sdei_interrupt_bind. The parameter is passed to a call to plat_ic_get_interrupt_type. It can be any arbitrary value passing checks in the function plat_ic_is_sgi. A compromised Normal World (Linux kernel) can enable a root-privileged attacker to issue arbitrary SMC calls. Using this primitive, he can control the content of registers x0 through x6, which are used to send parameters to TF-A. Out-of-bounds addresses can be read in the context of TF-A (EL3). Because the read value is never returned to non-secure memory or in registers, no leak is possible. An attacker can still crash TF-A, however.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49100

Sources (Detail)

https://github.com/ARM-software/arm-trusted-firmware/blob/a05414bedc9b1cc35cf...
https://github.com/ARM-software/arm-trusted-firmware/blob/a05414bedc9b1cc35cf...
https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/securi...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2024-02-23 00:27:23
  • Multiple Updates
2024-02-21 21:27:30
  • First insertion