Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-32690
HistoryJun 01, 2023 - 5:15 p.m.

Input validation

2023-06-0117:15:00
PRIOn knowledge base
www.prio-n.com
2
input validation
dmtf spdm
cryptography operation
timeout
patch
workaround
ctexponent
vca
communication
responder
requester
nvd

0.002 Low

EPSS

Percentile

55.7%

libspdm is a sample implementation that follows the DMTF SPDM specifications. Prior to versions 2.3.3 and 3.0, following a successful CAPABILITIES response, a libspdm Requester stores the Responder’s CTExponent into its context without validation. If the Requester sends a request message that requires a cryptography operation by the Responder, such as CHALLENGE, libspdm will calculate the timeout value using the Responder’s unvalidated CTExponent.

A patch is available in version 2.3.3. A workaround is also available. After completion of VCA, the Requester can check the value of the Responder’s CTExponent. If it greater than or equal to 64, then the Requester can stop communication with the Responder.

CPENameOperatorVersion
libspdmlt2.3.3

0.002 Low

EPSS

Percentile

55.7%

Related for PRION:CVE-2023-32690