CVE-2023-43632
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/09/2023
Last modified:
28/09/2023
Description
<br />
As noted in the “VTPM.md” file in the eve documentation, “VTPM is a server listening on port<br />
8877 in EVE, exposing limited functionality of the TPM to the clients. <br />
VTPM allows clients to<br />
execute tpm2-tools binaries from a list of hardcoded options”<br />
The communication with this server is done using protobuf, and the data is comprised of 2<br />
parts:<br />
<br />
1. Header<br />
<br />
2. Data<br />
<br />
When a connection is made, the server is waiting for 4 bytes of data, which will be the header,<br />
and these 4 bytes would be parsed as uint32 size of the actual data to come.<br />
<br />
Then, in the function “handleRequest” this size is then used in order to allocate a payload on<br />
the stack for the incoming data.<br />
<br />
As this payload is allocated on the stack, this will allow overflowing the stack size allocated for<br />
the relevant process with freely controlled data.<br />
<br />
* An attacker can crash the system. <br />
* An attacker can gain control over the system, specifically on the “vtpm_server” process<br />
which has very high privileges.<br />
<br />
<br />
Impact
Base Score 3.x
9.90
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linuxfoundation:edge_virtualization_engine:*:*:*:*:*:*:*:* | 3.0.0 (including) | 9.5.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



