#VU69339 Error Handling in keylime


Published: 2022-11-15

Vulnerability identifier: #VU69339

Vulnerability risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-3500

CWE-ID: CWE-388

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
keylime
Server applications / Other server solutions

Vendor: Keylime

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling when treating system level failures, such as network driver crash, causing the verifier component to quit and not recover. The verifier's state machine remains in "verified" state and the associated database is no longer updated for this agent.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

keylime: 2.0 - 6.5.0


External links
http://bugzilla.redhat.com/show_bug.cgi?id=2135343


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability