3.6
CVSSv2

CVE-2021-3623

Published: 02/03/2022 Updated: 07/11/2023
CVSS v2 Base Score: 3.6 | Impact Score: 4.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.1 | Impact Score: 4.2 | Exploitability Score: 1.8
VMScore: 320
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libtpms project libtpms

redhat enterprise linux 8.0

fedoraproject fedora 34

Vendor Advisories

Debian Bug report logs - #990522 libtpms: CVE-2021-3623 Package: src:libtpms; Maintainer for src:libtpms is Seunghun Han <kkamagui@gmailcom>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Thu, 1 Jul 2021 11:21:02 UTC Severity: important Tags: security, upstream Found in version libtpms/082-1 Reply ...
A flaw was found in libtpms The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read The highest threat from this vulnerability is to system availability ...
A security issue was found in libtpms before version 084 The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read ...