An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to UntrustedCall. UntrustedCall failed to validate the buffer range within sgx_params and allowed the host to return a pointer that was an address within the enclave memory. This allowed an attacker to read memory values from within the enclave.
[
{
"source": "https://github.com/google/asylo/commit/83036fd841d33baa7e039f842d131aa7881fdcc2",
"target": {
"file": "asylo/platform/primitives/sgx/trusted_sgx.cc"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2020-8936-0ce685a3",
"digest": {
"threshold": 0.9,
"line_hashes": [
"249849551134861197772701074161590743093",
"288542086381598857212057362218517107524",
"229767768765419279177818205328034353549",
"298254167630889455123360114835833751118"
]
},
"signature_type": "Line"
},
{
"source": "https://github.com/google/asylo/commit/83036fd841d33baa7e039f842d131aa7881fdcc2",
"target": {
"function": "TrustedPrimitives::UntrustedCall",
"file": "asylo/platform/primitives/sgx/trusted_sgx.cc"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2020-8936-63b825ab",
"digest": {
"length": 1047.0,
"function_hash": "63509712737912869867927962631554045034"
},
"signature_type": "Function"
}
]