Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2022-2068 CVE-2022-2097 CVE-2022-1292 |
CWE-ID | CWE-78 CWE-311 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #3 is available. |
Vulnerable software |
openEuler Operating systems & Components / Operating system libsgx-aesm-ecdsa-plugin Operating systems & Components / Operating system package or component sgx-ra-service Operating systems & Components / Operating system package or component sgx-dcap-pccs Operating systems & Components / Operating system package or component libsgx-ae-qve Operating systems & Components / Operating system package or component libsgx-qe3-logic Operating systems & Components / Operating system package or component libsgx-ae-le Operating systems & Components / Operating system package or component libsgx-dcap-default-qpl-devel Operating systems & Components / Operating system package or component libsgx-ra-uefi-devel Operating systems & Components / Operating system package or component libsgx-ae-pce Operating systems & Components / Operating system package or component libsgx-pce-logic Operating systems & Components / Operating system package or component libsgx-dcap-default-qpl Operating systems & Components / Operating system package or component libsgx-ae-qe3 Operating systems & Components / Operating system package or component libsgx-aesm-pce-plugin Operating systems & Components / Operating system package or component libsgx-epid Operating systems & Components / Operating system package or component sgx-pck-id-retrieval-tool Operating systems & Components / Operating system package or component libsgx-ra-uefi Operating systems & Components / Operating system package or component libsgx-dcap-quote-verify-devel Operating systems & Components / Operating system package or component libsgx-dcap-ql-devel Operating systems & Components / Operating system package or component linux-sgx-debugsource Operating systems & Components / Operating system package or component linux-sgx-debuginfo Operating systems & Components / Operating system package or component libsgx-aesm-epid-plugin Operating systems & Components / Operating system package or component libsgx-urts Operating systems & Components / Operating system package or component libsgx-ae-epid Operating systems & Components / Operating system package or component libsgx-quote-ex-devel Operating systems & Components / Operating system package or component libsgx-dcap-quote-verify Operating systems & Components / Operating system package or component libsgx-ra-network-devel Operating systems & Components / Operating system package or component libsgx-launch Operating systems & Components / Operating system package or component libsgx-enclave-common Operating systems & Components / Operating system package or component libsgx-aesm-quote-ex-plugin Operating systems & Components / Operating system package or component libsgx-epid-devel Operating systems & Components / Operating system package or component libsgx-ra-network Operating systems & Components / Operating system package or component libsgx-uae-service Operating systems & Components / Operating system package or component libsgx-quote-ex Operating systems & Components / Operating system package or component sgxsdk Operating systems & Components / Operating system package or component libsgx-enclave-common-devel Operating systems & Components / Operating system package or component libsgx-aesm-launch-plugin Operating systems & Components / Operating system package or component sgx-aesm-service Operating systems & Components / Operating system package or component libsgx-launch-devel Operating systems & Components / Operating system package or component libsgx-dcap-ql Operating systems & Components / Operating system package or component linux-sgx Operating systems & Components / Operating system package or component |
Vendor | openEuler |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU64559
Risk: Medium
CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-2068
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation in the c_rehash script distributed by some operating systems. A remote attacker with ability to pass data to c_rehash script can and execute arbitrary OS commands with the privileges of the script.
The vulnerability exists due to incomplete fix for #VU62765 (CVE-2022-1292).
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 22.03 LTS
libsgx-aesm-ecdsa-plugin: before 2.11.100-11
sgx-ra-service: before 2.11.100-11
sgx-dcap-pccs: before 2.11.100-11
libsgx-ae-qve: before 2.11.100-11
libsgx-qe3-logic: before 2.11.100-11
libsgx-ae-le: before 2.11.100-11
libsgx-dcap-default-qpl-devel: before 2.11.100-11
libsgx-ra-uefi-devel: before 2.11.100-11
libsgx-ae-pce: before 2.11.100-11
libsgx-pce-logic: before 2.11.100-11
libsgx-dcap-default-qpl: before 2.11.100-11
libsgx-ae-qe3: before 2.11.100-11
libsgx-aesm-pce-plugin: before 2.11.100-11
libsgx-epid: before 2.11.100-11
sgx-pck-id-retrieval-tool: before 2.11.100-11
libsgx-ra-uefi: before 2.11.100-11
libsgx-dcap-quote-verify-devel: before 2.11.100-11
libsgx-dcap-ql-devel: before 2.11.100-11
linux-sgx-debugsource: before 2.11.100-11
linux-sgx-debuginfo: before 2.11.100-11
libsgx-aesm-epid-plugin: before 2.11.100-11
libsgx-urts: before 2.11.100-11
libsgx-ae-epid: before 2.11.100-11
libsgx-quote-ex-devel: before 2.11.100-11
libsgx-dcap-quote-verify: before 2.11.100-11
libsgx-ra-network-devel: before 2.11.100-11
libsgx-launch: before 2.11.100-11
libsgx-enclave-common: before 2.11.100-11
libsgx-aesm-quote-ex-plugin: before 2.11.100-11
libsgx-epid-devel: before 2.11.100-11
libsgx-ra-network: before 2.11.100-11
libsgx-uae-service: before 2.11.100-11
libsgx-quote-ex: before 2.11.100-11
sgxsdk: before 2.11.100-11
libsgx-enclave-common-devel: before 2.11.100-11
libsgx-aesm-launch-plugin: before 2.11.100-11
sgx-aesm-service: before 2.11.100-11
libsgx-launch-devel: before 2.11.100-11
libsgx-dcap-ql: before 2.11.100-11
linux-sgx: before 2.11.100-11
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1899
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64922
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-2097
CWE-ID:
CWE-311 - Missing Encryption of Sensitive Data
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to an error in AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimized implementation. Under specific circumstances OpenSSL does not encrypt the entire message and can reveal sixteen bytes of data that was preexisting in the memory that wasn't written. A remote attacker can gain access to potentially sensitive information.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 22.03 LTS
libsgx-aesm-ecdsa-plugin: before 2.11.100-11
sgx-ra-service: before 2.11.100-11
sgx-dcap-pccs: before 2.11.100-11
libsgx-ae-qve: before 2.11.100-11
libsgx-qe3-logic: before 2.11.100-11
libsgx-ae-le: before 2.11.100-11
libsgx-dcap-default-qpl-devel: before 2.11.100-11
libsgx-ra-uefi-devel: before 2.11.100-11
libsgx-ae-pce: before 2.11.100-11
libsgx-pce-logic: before 2.11.100-11
libsgx-dcap-default-qpl: before 2.11.100-11
libsgx-ae-qe3: before 2.11.100-11
libsgx-aesm-pce-plugin: before 2.11.100-11
libsgx-epid: before 2.11.100-11
sgx-pck-id-retrieval-tool: before 2.11.100-11
libsgx-ra-uefi: before 2.11.100-11
libsgx-dcap-quote-verify-devel: before 2.11.100-11
libsgx-dcap-ql-devel: before 2.11.100-11
linux-sgx-debugsource: before 2.11.100-11
linux-sgx-debuginfo: before 2.11.100-11
libsgx-aesm-epid-plugin: before 2.11.100-11
libsgx-urts: before 2.11.100-11
libsgx-ae-epid: before 2.11.100-11
libsgx-quote-ex-devel: before 2.11.100-11
libsgx-dcap-quote-verify: before 2.11.100-11
libsgx-ra-network-devel: before 2.11.100-11
libsgx-launch: before 2.11.100-11
libsgx-enclave-common: before 2.11.100-11
libsgx-aesm-quote-ex-plugin: before 2.11.100-11
libsgx-epid-devel: before 2.11.100-11
libsgx-ra-network: before 2.11.100-11
libsgx-uae-service: before 2.11.100-11
libsgx-quote-ex: before 2.11.100-11
sgxsdk: before 2.11.100-11
libsgx-enclave-common-devel: before 2.11.100-11
libsgx-aesm-launch-plugin: before 2.11.100-11
sgx-aesm-service: before 2.11.100-11
libsgx-launch-devel: before 2.11.100-11
libsgx-dcap-ql: before 2.11.100-11
linux-sgx: before 2.11.100-11
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1899
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU62765
Risk: Medium
CVSSv4.0: 8.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2022-1292
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation in the c_rehash script distributed by some operating systems. A remote attacker with ability to pass data to c_rehash script can and execute arbitrary OS commands with the privileges of the script.
Install updates from vendor's repository.
Vulnerable software versionsopenEuler: 20.03 LTS SP1 - 22.03 LTS
libsgx-aesm-ecdsa-plugin: before 2.11.100-11
sgx-ra-service: before 2.11.100-11
sgx-dcap-pccs: before 2.11.100-11
libsgx-ae-qve: before 2.11.100-11
libsgx-qe3-logic: before 2.11.100-11
libsgx-ae-le: before 2.11.100-11
libsgx-dcap-default-qpl-devel: before 2.11.100-11
libsgx-ra-uefi-devel: before 2.11.100-11
libsgx-ae-pce: before 2.11.100-11
libsgx-pce-logic: before 2.11.100-11
libsgx-dcap-default-qpl: before 2.11.100-11
libsgx-ae-qe3: before 2.11.100-11
libsgx-aesm-pce-plugin: before 2.11.100-11
libsgx-epid: before 2.11.100-11
sgx-pck-id-retrieval-tool: before 2.11.100-11
libsgx-ra-uefi: before 2.11.100-11
libsgx-dcap-quote-verify-devel: before 2.11.100-11
libsgx-dcap-ql-devel: before 2.11.100-11
linux-sgx-debugsource: before 2.11.100-11
linux-sgx-debuginfo: before 2.11.100-11
libsgx-aesm-epid-plugin: before 2.11.100-11
libsgx-urts: before 2.11.100-11
libsgx-ae-epid: before 2.11.100-11
libsgx-quote-ex-devel: before 2.11.100-11
libsgx-dcap-quote-verify: before 2.11.100-11
libsgx-ra-network-devel: before 2.11.100-11
libsgx-launch: before 2.11.100-11
libsgx-enclave-common: before 2.11.100-11
libsgx-aesm-quote-ex-plugin: before 2.11.100-11
libsgx-epid-devel: before 2.11.100-11
libsgx-ra-network: before 2.11.100-11
libsgx-uae-service: before 2.11.100-11
libsgx-quote-ex: before 2.11.100-11
sgxsdk: before 2.11.100-11
libsgx-enclave-common-devel: before 2.11.100-11
libsgx-aesm-launch-plugin: before 2.11.100-11
sgx-aesm-service: before 2.11.100-11
libsgx-launch-devel: before 2.11.100-11
libsgx-dcap-ql: before 2.11.100-11
linux-sgx: before 2.11.100-11
CPE2.3https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1899
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.