CVE-2017-16837
Current Description
Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.
Basic Data
Published | November 16, 2017 |
Last Modified | August 17, 2018 |
Assigner | cve@mitre.org |
Data Type | CVE |
Data Format | MITRE |
Data Version | 4.0 |
Problem Type | CWE-20 |
CVE Data Version | 4.0 |
Base Metric V2
CVSS 2 - Version | 2.0 |
CVSS 2 - Vector String | AV:L/AC:L/Au:N/C:P/I:P/A:P |
CVSS 2 - Access Vector | LOCAL |
CVSS 2 - Access Complexity | LOW |
CVSS 2 - Authentication | NONE |
CVSS 2 - Confidentiality Impact | PARTIAL |
CVSS 2 - Availability Impact | PARTIAL |
CVSS 2 - Base Score | 4.6 |
Severity | MEDIUM |
Exploitability Score | 3.9 |
Impact Score | 6.4 |
Obtain All Privilege | false |
Obtain User Privilege | false |
Obtain Other Privilege | false |
Base Metric V3
CVSS 3 - Version | 3.0 |
CVSS 3 - Vector String | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVSS 3 - Attack Vector | LOCAL |
CVSS 3 - Attack Complexity | LOW |
CVSS 3 - Privileges Required | LOW |
CVSS 3 - User Interaction | NONE |
CVSS 3 - Scope | UNCHANGED |
CVSS 3 - Confidentiality Impact | HIGH |
CVSS 3 - Integrity Impact | HIGH |
CVSS 3 - Availability Impact | HIGH |
CVSS 3 - Base Score | 7.8 |
CVSS 3 - Base Severity | HIGH |
Exploitability Score | 1.8 |
Base Severity | HIGH |
Configurations
-
OR - Configuration 1
Cpe Version | Part | Vendor | Product | Version | Update | Edition | Language | SW Edition | Target SW | Target HW | Other | Version Start Including | Version End Including | Version Start Excluding | Version End Excluding |
2.3 | Application | Trusted Boot Project | Trusted Boot | 1.9.6 | * | * | * | * | * | * | * | |