-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Several Bugs #24
Comments
Null Pointer DereferenceSince zero address is under the control of untrusted host, NPD is dangerous for Enclave If mbedtls-SGX/example/enclave/ecalls.cpp Lines 44 to 46 in eab8e36
In mbedtls-SGX/example/enclave/ssl_conn_hdlr.cpp Lines 151 to 159 in eab8e36
|
Null Pointer DereferenceAlthough mbedtls-SGX/example/enclave/Enclave.edl Line 12 in eab8e36
mbedtls-SGX/example/enclave/ecalls.cpp Lines 44 to 46 in eab8e36
Even if mbedtls-SGX/example/enclave/ssl_conn_hdlr.cpp Lines 151 to 160 in eab8e36
|
UAF 1
If
ssl_conn_handle
called afterssl_conn_teardown
by untrusted hostmbedtls-SGX/example/enclave/ecalls.cpp
Lines 44 to 50 in eab8e36
this
is dangling, andthis->conf
at line 159 will cause UAFmbedtls-SGX/example/enclave/ssl_conn_hdlr.cpp
Lines 151 to 159 in eab8e36
UAF 2
If
ssl_conn_teardown
called afterssl_conn_teardown
by untrusted host, second will calldelete connectionHandler;
,srvcert
is freed member varibaleIn
TLSConnectionHandler::~TLSConnectionHandler
,mbedtls-SGX/example/enclave/ssl_conn_hdlr.cpp
Lines 129 to 131 in eab8e36
In
mbedtls_x509_crt_free
.mbedtls-SGX/trusted/mbedtls-2.6.0/library/x509_crt.c
Lines 2346 to 2360 in eab8e36
In
mbedtls_pk_free
, and finallyctx->pk_info
will access already free-edctx
, cause UAF.mbedtls-SGX/trusted/mbedtls-2.6.0/library/pk.c
Lines 66 to 74 in eab8e36
The text was updated successfully, but these errors were encountered: