Lack of stack protection exploit mechanisms in ASP Secure...
Moderate severity
Unreviewed
Published
Aug 13, 2024
to the GitHub Advisory Database
•
Updated Oct 31, 2024
Description
Published by the National Vulnerability Database
Aug 13, 2024
Published to the GitHub Advisory Database
Aug 13, 2024
Last updated
Oct 31, 2024
Lack of stack protection exploit mechanisms in ASP Secure OS Trusted Execution Environment (TEE) may allow a privileged attacker with access to AMD signing
keys to c006Frrupt the return address, causing a
stack-based buffer overrun, potentially leading to a denial of service.
References