CVE-2023-22745Classic Buffer Overflow in Tpm2-tss

Severity
6.4MEDIUMNVD
EPSS
0.0%
top 90.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 19
Latest updateMay 29

Description

tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In versions prior to 4.1.0-rc0, 4.0.1, and 3.2.2-rc1, `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of th

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.5 | Impact: 5.9

Affected Packages7 packages

CVEListV5tpm2-software/tpm2-tss< 4.0.1+1
Debiantpm2-software/tpm2-tss< 3.2.1-3+2
Ubuntutpm2-software/tpm2-tss< 2.3.2-1ubuntu0.20.04.2+2

Patches

🔴Vulnerability Details

2
OSV
tpm2-tss vulnerabilities2024-05-29
OSV
CVE-2023-22745: tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2)2023-01-19

📋Vendor Advisories

5
Ubuntu
TPM2 Software Stack vulnerabilities2024-05-29
CISA ICS
Siemens SCALANCE XCM-/XRM-3002024-02-15
Red Hat
tpm2-tss: Buffer Overlow in TSS2_RC_Decode2023-01-20
Microsoft
Buffer Overlow in TSS2_RC_Decode in tpm2-tss2023-01-10
Debian
CVE-2023-22745: tpm2-tss - tpm2-tss is an open source software implementation of the Trusted Computing Grou...2023