CVE-2017-9607
The BL1 FWU SMC handling code in ARM Trusted Firmware before 1.4 might allow attackers to write arbitrary data to secure memory, bypass the bl1_plat_mem_check protection mechanism, cause a denial of service, or possibly have unspecified other impact via a crafted AArch32 image, which triggers an integer overflow.
Published
2017-09-20T16:29:00.957
Last Modified
2025-04-20T01:37:25.860
Status
Deferred
Source
[email protected]
Severity
CVSSv3.0: 7.0 (HIGH)
CVSSv2 Vector
AV:N/AC:H/Au:N/C:P/I:P/A:P
- Access Vector: NETWORK
- Access Complexity: HIGH
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: PARTIAL
- Availability Impact: PARTIAL
Exploitability Score
4.9
Impact Score
6.4
Weaknesses
Affected Vendors & Products
References
-
https://github.com/ARM-software/arm-trusted-firmware/blob/v1.4/docs/change-log.rst#new-features
Issue Tracking, Patch, Release Notes, Third Party Advisory
([email protected])
-
https://github.com/ARM-software/arm-trusted-firmware/wiki/ARM-Trusted-Firmware-Security-Advisory-TFV-4
Issue Tracking, Patch, Third Party Advisory
([email protected])
-
https://github.com/ARM-software/arm-trusted-firmware/blob/v1.4/docs/change-log.rst#new-features
Issue Tracking, Patch, Release Notes, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/ARM-software/arm-trusted-firmware/wiki/ARM-Trusted-Firmware-Security-Advisory-TFV-4
Issue Tracking, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)