Impact
VTPM server listens on port 8877, exposing limited TPM functionality. The server reads 4 bytes as a uint32 size header, then allocates that amount on the stack for incoming data. This allows denial of service attacks against the vTPM service.
An workload (a container or VM) running on EVE-OS can use this to generate a DOS against the vTPM service.
Patches
Fixed in 9.4.3-lts and 10.1.0
Workarounds
No
References
Impact
VTPM server listens on port 8877, exposing limited TPM functionality. The server reads 4 bytes as a uint32 size header, then allocates that amount on the stack for incoming data. This allows denial of service attacks against the vTPM service.
An workload (a container or VM) running on EVE-OS can use this to generate a DOS against the vTPM service.
Patches
Fixed in 9.4.3-lts and 10.1.0
Workarounds
No
References