Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Memory Corruption in Enclave #71

Open
Tcc100 opened this issue May 10, 2022 · 0 comments
Open

Memory Corruption in Enclave #71

Tcc100 opened this issue May 10, 2022 · 0 comments

Comments

@Tcc100
Copy link

Tcc100 commented May 10, 2022

We found several security vulnerabilities in the enclave.
First, the g_environment pointer can be null while being dereferenced.
Since it contains nested pointers, i.e., the std::map, an attacker can gain arbitrary read/write by mapping the null page.

In addition, there are stack-based buffer overflow vulnerabilities in ecdsa_keygen_unseal, tc_provision_ecdsa_key, ecdsa_keygen_unseal, and tc_provision_hybrid_key.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant